Skip to main navigation Skip to search Skip to main content

Survey of security protocol verification based on process algebra

  • Meng Jun Li*
  • , Zhou Jun Li
  • , Huo Wang Chen
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Security protocols are used to provide secure communication over open network. Process algebra refers to those algebraic approaches to the study of communication and concurrency systems. The verification methods based on process algebra are the important verification methods of security protocols. The main verification methods based on process algebra of security protocols are presented. Finally the possible new directions of security protocols verification are also stated.

Original languageEnglish
Pages (from-to)1097-1103
Number of pages7
JournalJisuanji Yanjiu yu Fazhan/Computer Research and Development
Volume41
Issue number7
StatePublished - Jul 2004
Externally publishedYes

Keywords

  • Authentication
  • Formal verification
  • Process algebra
  • Secrecy
  • Security protocol

Fingerprint

Dive into the research topics of 'Survey of security protocol verification based on process algebra'. Together they form a unique fingerprint.

Cite this