ATTACKS ON SECURITY PROTOCOLS USING AVISPA
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Now a days, Use of Internet is increased day by day. Both Technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are different types of protocols working behind various parameters of Internet such as security, accessibility, availability etc. Among all these parameters, Security is the most important for each and every internet user. There are many security protocols are developed in networking and also there are many tools for verifying these types of protocols. All these protocols should be analyzed through the verification tool. AVISPA is a protocol analysis tool for automated validation of Internet security protocol and applications. In this paper, we will discuss about Avispa library which describes the security properties, their classification, the attack found and the actual HLPSL specification of security protocols.
Authors and Affiliations
Vaishakhi S , Prof. Radhika M
A Survey of Defect Prediction on Software Leads to Quality Product
Software team always try to produce a product with zero defects. Defect prediction leads to high quality product and quality assurance. Software defects prediction aims to reduce software testing efforts by guiding the t...
Survey of Relevance Feedback methods in Content Based Image Retrieval
In content Based Image Retrieval, images are retrieved based on color, texture and shape (low level perception). There is a gap between user semantics (high level perception) and low level perception. Relevance feedback...
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
A STUDY ON CLOUD COMPUTING IN AVIATION AND AEROSPACE
Right from the time to establish aerospace and aviation industries till the air vehicle departures safely, passenger information, co-ordination and integration amongst several stakeholders are very crucial. The pressure...
Self-timed Circuit Device Size Optimization for an Input Data Distribution
New design techniques with energy-delay characteristics that are superior to that of the synchronous timing and control approach are needed today because the throughput of systems realized with this method is limited by...