Computers & Internet Books:

Operational Semantics and Verification of Security Protocols

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!
$189.00
Available from supplier

The item is brand new and in-stock with one of our preferred suppliers. The item will ship from a Mighty Ape warehouse within the timeframe shown.

Usually ships in 3-4 weeks
Free Delivery with Primate
Join Now

Free 14 day free trial, cancel anytime.

Buy Now, Pay Later with:

4 payments of $47.25 with Afterpay Learn more

6 weekly interest-free payments of $31.50 with Laybuy Learn more

Availability

Delivering to:

Estimated arrival:

  • Around 18-28 June using International Courier

Description

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

Author Biography

The first author is a senior scientist working at the ETH Zurich, the second author is a professor at the Universite du Luxembourg; both have a research focus and teaching responsibilities in the areas of information security, protocols, privacy, trust and formal methods.
Release date NZ
June 1st, 2011
Pages
188
Edition
2011
Audience
  • Professional & Vocational
Illustrations
biography
Publisher
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Country of Publication
Germany
Imprint
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Dimensions
156x234x12
ISBN-13
9783540786351
Product ID
10048901

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...