Logo - springer
Slogan - springer

Computer Science - Communication Networks | Secure Transaction Protocol Analysis - Models and Applications

Secure Transaction Protocol Analysis

Models and Applications

Chen, Qingfeng, Zhang, Chengqi, Zhang, Shichao

2008

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$69.99

(net) price for USA

ISBN 978-3-540-85074-8

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$89.99

(net) price for USA

ISBN 978-3-540-85073-1

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce.

The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security
protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.

Content Level » Research

Keywords » ban logic - card based payment - cryptography - data analysis - data mining - endl - mobile device - netbill - nrl protocol - security - security protocols - set protocol - stp - tools - transaction protocols

Related subjects » Communication Networks - Database Management & Information Retrieval - Software Engineering

Table of contents 

Overview of Security Protocol Analysis.- Formal Analysis of Secure Transaction Protocols.- Model Checking in Security Protocol Analysis.- Uncertainty Issues in Secure Messages.- Applications of Data Mining in Protocol Analysis.- Detection Models of Collusion Attacks.- Conclusion and Future Works.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.