Formal Analysis of a Non-Repudiation Protocol.
Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.
![]()
|
Text
csfw98.pdf - Accepted version Manuscript Available under License : See the attached licence file. Download (223kB) |
|
![]() |
Text (licence)
licence.txt Download (1kB) |
Abstract
The paper applies the theory of communicating sequential processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols differ from authentication and key-exchange protocols in that the participants require protection from each other, rather than from an external hostile agent. This means that the kinds of properties that are required of such a protocol, and the way it needs to be modelled to enable analysis, are different to the standard approaches taken to the more widely studied class of protocols and properties. A non-repudiation protocol proposed by Zhou and Gollmann (1996) is analysed within this framework, and this highlights some novel considerations that are required for this kind of protocol
Item Type: | Conference or Workshop Item (Conference Paper) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Divisions : | Faculty of Engineering and Physical Sciences > Computer Science | ||||||||
Authors : | Schneider, S | ||||||||
Date : | 1998 | ||||||||
DOI : | 10.1109/CSFW.1998.683155 | ||||||||
Contributors : |
|
||||||||
Depositing User : | Symplectic Elements | ||||||||
Date Deposited : | 30 Sep 2011 14:15 | ||||||||
Last Modified : | 06 Jul 2019 05:08 | ||||||||
URI: | http://epubs.surrey.ac.uk/id/eprint/7213 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year