Automated verification tools for cryptographic protocols
dc.contributor.author | Hassan, Adel | en |
dc.contributor.author | Ishaq, Isam | en |
dc.contributor.author | Minilla, Jorge | en |
dc.date.accessioned | 2022-02-05T10:32:19Z | |
dc.date.available | 2022-02-05T10:32:19Z | |
dc.date.issued | 2021-11-17 | |
dc.description.abstract | Security protocols are used to secure communications using cryptographic tools. Different communication and network security protocols, such as HTTPS and TLS, have become widely used in current applications and systems that are deployed in different industries such as banking, insurance, mobile operator, etc. Verifying the security of these security methods is becoming increasingly important to guarantee that they fulfill their goals, and automated verification tools are profiled as the most promising instrument for this task. Automated verification tools can be categorized according to the approach that they use, symbolic or computational, and their prove method: model checking and theorem prove. This article aims to review the methods employed by the different types of verification tools and provide a comparative of the tools more widely used nowadays. | en |
dc.identifier.isbn | 978-1-6654-1662-7 | |
dc.identifier.isbn | 978-1-6654-1663-4 | |
dc.identifier.issn | 2767-7044 | |
dc.identifier.issn | 2767-7036 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/9692071 | |
dc.identifier.uri | https://dspace.alquds.edu/handle/20.500.12213/6510 | |
dc.language.iso | en | |
dc.publisher | IEEE | |
dc.subject | Verification tools | en |
dc.subject | security protocols | en |
dc.subject | cryptography | en |
dc.subject | formal analysis | en |
dc.subject | Network security | en |
dc.subject | Model checking | en |
dc.title | Automated verification tools for cryptographic protocols | |
dc.type | Article |
Collections
Version History
You are currently viewing version 1 of the item.