The aim of this paper is to present a methodology for verifying security requirements of electronic payment protocols by means of NuSMV, a symbolic model checker. Our work principally focus on formal representation of security requirements. Indeed, we propose an extension of the correspondence property, so far used only for authentication, to other requirements, as confidentiality and integrity. For instance, these are the basic security requirements of electronic payment protocols as SET. We illustrate as case study a variant of SET proposed by Lu and Smolka. This variant has been proposed in order to obtain a version of protocol more suitable for formal analysis. Notice that, up to now this variant has been considered secure
Abstract: Secure electronic commerce relies on the application of secure transaction protocol. Howev...
In this thesis, we show how formal methods can be used for the cryptographically sound verification ...
In ubiquitous computing devices, users tend to store some valuable in-formation in their device. Eve...
The design of security protocols is given an increasing level of academic interest, as an increasing...
Security protocols are critical components for the construction of secure Internet services but thei...
International audienceElectronic cash (e-cash) permits secure e-payments by providing security and a...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Abstract—Model checking has been successfully applied to verify the security properties of network p...
Abstract. Security protocol verification has been a very active research area since the 1990s. This ...
Security protocols are one of the imperative steps in creating and ensuring the secure communication...
This paper proposes a knowledge based approach to analyze protocols and describes the formal verific...
In a ubiquitous environment, it is preferable for authentication and key exchange protocols to be op...
Nowadays, the necessity of developing collaborative and distributed computing systems makes network...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Protocol verification is an exciting area of network security that intersects engineering and formal...
Abstract: Secure electronic commerce relies on the application of secure transaction protocol. Howev...
In this thesis, we show how formal methods can be used for the cryptographically sound verification ...
In ubiquitous computing devices, users tend to store some valuable in-formation in their device. Eve...
The design of security protocols is given an increasing level of academic interest, as an increasing...
Security protocols are critical components for the construction of secure Internet services but thei...
International audienceElectronic cash (e-cash) permits secure e-payments by providing security and a...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Abstract—Model checking has been successfully applied to verify the security properties of network p...
Abstract. Security protocol verification has been a very active research area since the 1990s. This ...
Security protocols are one of the imperative steps in creating and ensuring the secure communication...
This paper proposes a knowledge based approach to analyze protocols and describes the formal verific...
In a ubiquitous environment, it is preferable for authentication and key exchange protocols to be op...
Nowadays, the necessity of developing collaborative and distributed computing systems makes network...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Protocol verification is an exciting area of network security that intersects engineering and formal...
Abstract: Secure electronic commerce relies on the application of secure transaction protocol. Howev...
In this thesis, we show how formal methods can be used for the cryptographically sound verification ...
In ubiquitous computing devices, users tend to store some valuable in-formation in their device. Eve...