Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method
Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, an...
Saved in:
| Main Authors: | Hanane Houmani, Mohamed Mejri |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2012-01-01
|
| Series: | Journal of Computer Networks and Communications |
| Online Access: | http://dx.doi.org/10.1155/2012/254942 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
by: Shaik Aseena Babu, et al.
Published: (2025-01-01) -
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
by: Baghdad Science Journal
Published: (2016-06-01) -
A comparison of several intrusion detection methods using the NSL-KDD dataset
by: hazem salim abdullah
Published: (2024-06-01) -
The NSL complex regulates housekeeping genes in Drosophila.
by: Kin Chung Lam, et al.
Published: (2012-01-01) -
A collinear shower algorithm for NSL non-singlet fragmentation
by: Melissa van Beekveld, et al.
Published: (2025-03-01)