We will discuss modeling parallelism. The aim is to capture sequential runs and parallelism in protocols' running using modal checker (type of formal analysis). Role confusion attacks are the most difficult attacks to analyse—either theoretically or in practical proving (because of huge number of combinations).
In: Tatra Mountains Mathematical Publications, vol. 29, no. 3
Rok, strany: 2004, 137 - 145
This article lies in the area of security protocol analysis, focusing on data confidentiality and authentication. Security protocols are essential for protecting electronic information. In literature there are many protocols which have been found as insecure in some aspects. Formal analysis is checking the protocol's security (fullfiting its aims, e.g., authentication) and therefore helps in construction of protocols.
Krivoš–belluš, R. 2004. Formal analysis and parallelism in protocols. In Tatra Mountains Mathematical Publications, vol. 29, no.3, pp. 137-145. 1210-3195.
Krivoš–belluš, R. (2004). Formal analysis and parallelism in protocols. Tatra Mountains Mathematical Publications, 29(3), 137-145. 1210-3195.