Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method
Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, an...
Main Authors: | Hanane Houmani, Mohamed Mejri |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2012-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2012/254942 |
Similar Items
-
Interpretation functions-based approach to verify secrecy of cryptographic protocols
by: Houmani, Hanane
Published: (2009) -
Interpretation Functions-Based Approach to Verify Secrecy of Cryptographic Protocols
by: Houmani, Hanane
Published: (2009) -
Crosstalk between NSL histone acetyltransferase and MLL/SET complexes: NSL complex functions in promoting histone H3K4 di-methylation activity by MLL/SET complexes.
by: Xiaoming Zhao, et al.
Published: (2013-11-01) -
Examining the function of KIAA1310/NSL3, a member of the NSL, TET2 and TET3 epigenetic complexes
by: Khorasani, Abraham J.
Published: (2015) -
The NSL complex regulates housekeeping genes in Drosophila.
by: Kin Chung Lam, et al.
Published: (2012-01-01)