Security analysis of two fair exchange protocols
dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Gahlot, Jai | |
dc.date.accessioned | 2017-06-10T14:37:10Z | |
dc.date.available | 2017-06-10T14:37:10Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | Gahlot, Jai (2007). Security analysis of two fair exchange protocols. Dhirubhai Ambani Institute of Information and Communication Technology, vii, 97 p. (Acc.No: T00113) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/150 | |
dc.description.abstract | E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer any loss of significant value. It is important to verify that an e-commerce protocol satisfies its fairness goal. Formal methods such as model checking can be helpful in this regard. To this end, it is essential to develop a model of the protocol under realistic assumptions. Using the NetBill protocol as an example this work shows how improper modelling can lead to incorrect claims about the protocol. It also shows how a carefully developed formal model can be successfully used to discover previously unknown flaws in an existing protocol. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Computer security | |
dc.subject | Access control | |
dc.subject | Computer network protocols | |
dc.subject | Right of electronic commerce | |
dc.subject | Security measures | |
dc.subject | Security assessment | |
dc.subject | Security auditing | |
dc.classification.ddc | 005.8 GAH | |
dc.title | Security analysis of two fair exchange protocols | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200511014 | |
dc.accession.number | T00113 |
Files in this item
This item appears in the following Collection(s)
-
M Tech Dissertations [923]