Affordable Access

Non-repudiation Analysis with

IFIP Advances in Information and Communication Technology (AICT)
Publication Date


This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus , using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach introduced by M. Buchholtz and H. Gao for authentication and freshness analyses.Full Text at Springer, may require registration or fee

There are no comments yet on this publication. Be the first to share your thoughts.


Seen <100 times

More articles like this

Automatic Analysis of a Non-Repudiation Protocol

on Electronic Notes in Theoretica... Jan 01, 2005

Non-repudiation analysis using LySawith annotation...

on Computer Languages Systems & S... Jan 01, 2010
More articles like this..