Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2009, Issue 8, Pages 292–310 (Mi trspy14)  

Security protocols verification combining existing approaches and tools

I. V. Kotenko, S. A. Reznik, A. V. Shorov

St. Petersburg Institute for Informatics and Automation of RAS
Abstract: This paper evaluates existing approaches to the security protocols verification and explains why it is impossible to thoroughly verify security protocols using only one of them. To solve this problem combined verification approach which is based on the assembly of strong sides specific for different existing approaches and tools is suggested.
Keywords: security protocols, formal methods, verification, model checking, theorem proving.
UDC: 004.42:004.94:004.7
Language: Russian
Citation: I. V. Kotenko, S. A. Reznik, A. V. Shorov, “Security protocols verification combining existing approaches and tools”, Tr. SPIIRAN, 8 (2009), 292–310
Citation in format AMSBIB
\Bibitem{KotRezSho09}
\by I.~V.~Kotenko, S.~A.~Reznik, A.~V.~Shorov
\paper Security protocols verification combining existing approaches and tools
\jour Tr. SPIIRAN
\yr 2009
\vol 8
\pages 292--310
\mathnet{http://mi.mathnet.ru/trspy14}
Linking options:
  • https://www.mathnet.ru/eng/trspy14
  • https://www.mathnet.ru/eng/trspy/v8/p292
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024