Affordable Access

Non-repudiation Analysis with

Authors
Publisher
IFIP Advances in Information and Communication Technology (AICT)
Publication Date

Abstract

This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus , using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach introduced by M. Buchholtz and H. Gao for authentication and freshness analyses.Full Text at Springer, may require registration or fee

There are no comments yet on this publication. Be the first to share your thoughts.

Statistics

Seen <100 times
0 Comments