Formal analysis and design of authentication protocols

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Original languageEnglish
    Title of host publicationHandbook of Research on Information Security and Assurance
    EditorsJ.N.D. Gupta, S. Sharma
    Place of PublicationHershey PA
    PublisherIGI Global
    Pages240-253
    ISBN (Print)9781599048550, 9781599048567
    DOIs
    Publication statusPublished - 2009

    Bibliographical note

    The full text is not available from the repository. Please note Dr Shaikh was working at the United Nations University (UNU), Macau, SAR China, at the time of Publication.

    Keywords

    • formal analysis
    • authentication protocols
    • cryptography

    Cite this

    Shaikh, S. A. (2009). Formal analysis and design of authentication protocols. In J. N. D. Gupta, & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 240-253). Hershey PA: IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch020

    Formal analysis and design of authentication protocols. / Shaikh, Siraj A.

    Handbook of Research on Information Security and Assurance. ed. / J.N.D. Gupta; S. Sharma. Hershey PA : IGI Global, 2009. p. 240-253.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Shaikh, SA 2009, Formal analysis and design of authentication protocols. in JND Gupta & S Sharma (eds), Handbook of Research on Information Security and Assurance. IGI Global, Hershey PA, pp. 240-253. https://doi.org/10.4018/978-1-59904-855-0.ch020
    Shaikh SA. Formal analysis and design of authentication protocols. In Gupta JND, Sharma S, editors, Handbook of Research on Information Security and Assurance. Hershey PA: IGI Global. 2009. p. 240-253 https://doi.org/10.4018/978-1-59904-855-0.ch020
    Shaikh, Siraj A. / Formal analysis and design of authentication protocols. Handbook of Research on Information Security and Assurance. editor / J.N.D. Gupta ; S. Sharma. Hershey PA : IGI Global, 2009. pp. 240-253
    @inbook{2cdf8e53b1a4448090c2794d2568df80,
    title = "Formal analysis and design of authentication protocols",
    keywords = "formal analysis, authentication protocols, cryptography",
    author = "Shaikh, {Siraj A.}",
    note = "The full text is not available from the repository. Please note Dr Shaikh was working at the United Nations University (UNU), Macau, SAR China, at the time of Publication.",
    year = "2009",
    doi = "10.4018/978-1-59904-855-0.ch020",
    language = "English",
    isbn = "9781599048550",
    pages = "240--253",
    editor = "J.N.D. Gupta and S. Sharma",
    booktitle = "Handbook of Research on Information Security and Assurance",
    publisher = "IGI Global",

    }

    TY - CHAP

    T1 - Formal analysis and design of authentication protocols

    AU - Shaikh, Siraj A.

    N1 - The full text is not available from the repository. Please note Dr Shaikh was working at the United Nations University (UNU), Macau, SAR China, at the time of Publication.

    PY - 2009

    Y1 - 2009

    KW - formal analysis

    KW - authentication protocols

    KW - cryptography

    U2 - 10.4018/978-1-59904-855-0.ch020

    DO - 10.4018/978-1-59904-855-0.ch020

    M3 - Chapter

    SN - 9781599048550

    SN - 9781599048567

    SP - 240

    EP - 253

    BT - Handbook of Research on Information Security and Assurance

    A2 - Gupta, J.N.D.

    A2 - Sharma, S.

    PB - IGI Global

    CY - Hershey PA

    ER -