White Rose University Consortium logo
University of Leeds logo University of Sheffield logo York University logo

Automated design of security protocols

Hao, C., Clark, J.A. and Jacob, J.L. (2004) Automated design of security protocols. Computational Intelligence, 20 (3). pp. 503-516. ISSN 0824-7935

Full text not available from this repository.

Abstract

Security protocols play an important role in modern communications. However, security protocol development is a delicate task, and experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimization techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without the loss of efficiency and thereby synthesize public key protocols and hybrid protocols.

Item Type: Article
Academic Units: The University of York > Computer Science (York)
Depositing User: York RAE Import
Date Deposited: 07 Jul 2009 14:32
Last Modified: 07 Jul 2009 14:32
Published Version: http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x
Status: Published
Publisher: John Wiley & Sons, Inc.,
Identification Number: 10.1111/j.0824-7935.2004.00249.x
URI: http://eprints.whiterose.ac.uk/id/eprint/5929

Actions (login required)

View Item View Item