Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, an...

Full description

Saved in:
Bibliographic Details
Main Authors: Hanane Houmani, Mohamed Mejri
Format: Article
Language:English
Published: Wiley 2012-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2012/254942
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items