Qingfeng Chen, Chengqi Zhang, Shichao Zhang .
Qingfeng Chen, Chengqi Zhang, Shichao Zhang. The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols.
Models and Applications. Authors: Chen, Qingfeng, Zhang, Chengqi, Zhang, Shichao. Formal Analysis of Secure Transaction Protocols. Model Checking in Security Protocol Analysis.
A complicated security protocol can be bols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation.
oceedings{Chen2008SecureTP, title {Secure Transaction Protocol Analysis: Models and Applications}, author {Qingfeng Chen and Chengqi Zhang and Shichao Zhang}, booktitle {Lecture Notes i. .
oceedings{Chen2008SecureTP, title {Secure Transaction Protocol Analysis: Models and Applications}, author {Qingfeng Chen and Chengqi Zhang and Shichao Zhang}, booktitle {Lecture Notes in Computer Science}, year {2008} }. Qingfeng Chen, Chengqi Zhang, Shichao Zhang. Overview of Security Protocol Analysis. Applications of Data Mining in Protocol Analysis. Detection Models of Collusion Attacks. Conclusion and Future Works.
Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science, Programming and Software Engineering). Category: Computer Science, Computer Science.
Secure Transaction Protocol Analysis book. Qingfeng Chen, Chengqi Zhang.
The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems.
Qingfeng Chen, Chengqi Zhang, Shichao Zhang - Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science, Programming and Software Engineering). Qingfeng Chen, Chengqi Zhang, Shichao Zhang Models and Applications.
The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis.
by Qingfeng Chen Chengqi Zhang Shichao Zhang. ISBN 9783540873150 (978-3-540-87315-0) Softcover, Springer, 2009. Founded in 1997, BookFinder.