Formal analysis and design of authentication protocols

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Original languageEnglish
    Title of host publicationHandbook of Research on Information Security and Assurance
    EditorsJ.N.D. Gupta, S. Sharma
    Place of PublicationHershey PA
    PublisherIGI Global
    Pages240-253
    ISBN (Print)9781599048550, 9781599048567
    DOIs
    Publication statusPublished - 2009

    Bibliographical note

    The full text is not available from the repository. Please note Dr Shaikh was working at the United Nations University (UNU), Macau, SAR China, at the time of Publication.

    Keywords

    • formal analysis
    • authentication protocols
    • cryptography

    Cite this

    Shaikh, S. A. (2009). Formal analysis and design of authentication protocols. In J. N. D. Gupta, & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 240-253). Hershey PA: IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch020