Security Protocols Analysis: The Interpretation FunctionsBased Method,Used

Security Protocols Analysis: The Interpretation FunctionsBased Method,Used

In Stock
SKU: DADAX3659219002
Brand: LAP Lambert Academic Publishing
Condition: New
Regular price$129.11
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

The security of Internet networks and distributed systems are based on the security of cryptographic protocols. A flaw in a cryptographic protocol could lead to considerable consequences affecting societies or individuals. To prevent these flaws, the formal methods have been shown the best and most suited to design and analyze the cryptographic protocols. The first attempt in this way was to use modelchecking techniques to explore a finite subset of the executions set of the analyzed protocol in order to discover flaws. However, since a protocol can exhibit an infinite set of executions, it is very difficult for these approaches to certify the security of a given protocol when they fail to find flaws. Recently, there have been some efforts to find approaches that allow to ensure the security of protocols but they are dedicated to some class of protocols. Also, almost of them could not analyze cryptographic protocols used in our daily lives. To overcome these problems, we present in this book the interpretation functionbased method that is not restrictive to a class of cryptographic protocols and could analyze protocols such as SET the most used protocol in ecommerce.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed