Using TLA+/TLC for modeling and verification of cryptographic protocols
Interacting in open networks carries certain risks. To ensure the information security of network interaction participants, cryptographic protocols (CrP) are used. High levels of security can be achieved through their formal verification. A common formal method for verifying CrP is model checking....
Saved in:
| Main Authors: | Maxim V. Neyzov, Egor V. Kuzmin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Yaroslavl State University
2024-12-01
|
| Series: | Моделирование и анализ информационных систем |
| Subjects: | |
| Online Access: | https://www.mais-journal.ru/jour/article/view/1898 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
by: Nadezhda S. Mogilevskaya, et al.
Published: (2011-11-01) -
A Systematic Review on the Applications of <span style="font-variant: small-caps">Uppaal</span>
by: Iwona Grobelna, et al.
Published: (2025-05-01) -
Formal Verification of Business Constraints in Workflow-Based Applications
by: Florin Stoica, et al.
Published: (2024-12-01) -
Deductive Verification of the Sliding Window Protocol
by: D. A. Chkliaev, et al.
Published: (2015-03-01) -
Formal Verification of Code Conversion: A Comprehensive Survey
by: Amira T. Mahmoud, et al.
Published: (2024-11-01)