{"title":"身份验证协议的属性验证","authors":"K. Indiradevi, V. Nair, J. Abraham","doi":"10.1109/ASSET.1999.756755","DOIUrl":null,"url":null,"abstract":"Authentication is an essential component in building security frameworks to defend confidentiality and integrity in communication networks. A large number of seemingly secure authentication protocols have been found to be flawed, potentially leading to impersonation. The often too subtle nature of such flaws has generated much interest in their rigorous analysis and verification. This paper proposes a state based framework using the property verification technique to formally model and verify these protocols.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Property verification for authentication protocols\",\"authors\":\"K. Indiradevi, V. Nair, J. Abraham\",\"doi\":\"10.1109/ASSET.1999.756755\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is an essential component in building security frameworks to defend confidentiality and integrity in communication networks. A large number of seemingly secure authentication protocols have been found to be flawed, potentially leading to impersonation. The often too subtle nature of such flaws has generated much interest in their rigorous analysis and verification. This paper proposes a state based framework using the property verification technique to formally model and verify these protocols.\",\"PeriodicalId\":340666,\"journal\":{\"name\":\"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASSET.1999.756755\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASSET.1999.756755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Property verification for authentication protocols
Authentication is an essential component in building security frameworks to defend confidentiality and integrity in communication networks. A large number of seemingly secure authentication protocols have been found to be flawed, potentially leading to impersonation. The often too subtle nature of such flaws has generated much interest in their rigorous analysis and verification. This paper proposes a state based framework using the property verification technique to formally model and verify these protocols.