• Qingfeng Chen
  • Chengqi Zhang
  • Shichao Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5111)


Security protocols (cryptographic protocol) have been widely used to not only achieve traditional goals of data confidentiality, integrity and authentication, but also secure a variety of other desired characteristics of computer-mediated transactions recently. To guarantee reliable protocols, a great deal of formal methods has been undertaken not only to develop diverse tools with specialized purpose or general purpose, but also to apply them to the analysis of realistic protocols. Many of them have been proved to be useful in detecting some intuitive attacks in security protocols. In many cases, a useful feedback is supplied to designers in order to improve the protocol’s security. For both beginners and experienced researchers, this book will present useful information on relevant technologies that can be extended or adapted. A comprehensive introduction to the basic concepts and core techniques will be presented. In this chapter, we explain what is security protocols and how they can be used to ensure secure transactions, what challenging issues in e-commerce (electronic commerce) are, why security protocol analysis important, how they are performed, and what are the ongoing efforts and relevant work. We will also explain the limitations in previous work and why it is important to develop new approaches. These questions will be briefly answered. In particular, we will focus on the discussion regarding secure transaction protocols. Finally, some emerging issues and the ways they are being met are also described.


Model Check Formal Method Temporal Logic Security Protocol Linear Temporal Logic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Qingfeng Chen
    • 1
  • Chengqi Zhang
    • 2
  • Shichao Zhang
    • 3
  1. 1.Deakin University, School of Engineering and Information TechnologyMelbourneAustralia
  2. 2.University of Technology, Faculty of Engineering and Information Technology, Centre for Quantum Computation and Intelligent Systems, and Australian ACS National Committee for Artificial IntelligenceSydneyAustralia
  3. 3.Guangxi Normal University, College of CS and IT, Guilin, China, and University of Technology, Faculty of Engineering and Information TechnologySydneyAustralia

Personalised recommendations