Secure Transaction Protocol Analysis Models and Applications
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal m
- PDF / 3,034,951 Bytes
- 239 Pages / 430.02 x 660.9 pts Page_size
- 60 Downloads / 245 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
5111
Qingfeng Chen Chengqi Zhang Shichao Zhang
Secure Transaction Protocol Analysis Models and Applications
13
Authors Qingfeng Chen Deakin University School of Engineering and Information Technology Melbourne, Australia E-mail: [email protected] Chengqi Zhang University of Technology, Sydney Faculty of Engineering and Information Technology Centre for Quantum Computation and Intelligent Systems Sydney, Australia E-mail: [email protected] Shichao Zhang Guangxi Normal University College of CS and IT, Guilin, China and University of Technology, Sydney Faculty of Engineering and Information Technology Sydney, Australia E-mail: [email protected]
Library of Congress Control Number: 2008931701 CR Subject Classification (1998): C.2, D.1.3, F.1.2, I.2.8, D.4 LNCS Sublibrary: SL 2 – Programming and Software Engineering ISSN ISBN-10 ISBN-13
0302-9743 3-540-85073-2 Springer Berlin Heidelberg New York 978-3-540-85073-1 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2008 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12327997 06/3180 543210
Preface
The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been showing signs of new maturity and consolidation. The development of these formal methods is motivated by the hostile nature of some aspects of the network and the persistent efforts of intruders, and has been widely
Data Loading...