Modeling efficient multi-chained stream signature protocol using communicating sequential processeses

dc.contributor.author Ahmet Hasan Koltuksuz
dc.contributor.author Murat Ozkan
dc.contributor.author Burcu Külahçioǧlu
dc.contributor.author Kulahcioglu, Burcu
dc.contributor.author Ozkan, Murat
dc.contributor.author Koltuksuz, Ahmet
dc.date.accessioned 2025-10-06T17:53:09Z
dc.date.issued 2010
dc.description.abstract Communicating Sequential Processes (CSP) is a process algebra designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages forming hash chains which introduces difficulties for modeling and verification. In this paper, we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.
dc.description.sponsorship National University of Singapore (NUS), Infocomm Development Authority of Singapore, Reliability Society
dc.identifier.doi 10.1109/SSIRI-C.2010.23
dc.identifier.isbn 9780769540870
dc.identifier.scopus 2-s2.0-77956116875
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-77956116875&doi=10.1109%2FSSIRI-C.2010.23&partnerID=40&md5=f81fb8da9279cf426d25389d871322b6
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/10282
dc.identifier.uri https://doi.org/10.1109/SSIRI-C.2010.23
dc.language.iso English
dc.relation.ispartof 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion SSIRI-C 2010
dc.rights info:eu-repo/semantics/openAccess
dc.subject Communicating Sequential Processeses, Model Checking, Security Protocol Verification, Authentication Protocols, Communicating Sequential Process, Communicating Sequential Processeses, Concurrent Systems, Finite-state Models, Hash Chains, Infinite State, Process Algebras, Protocol Message, Security Protocol Verification, Security Protocols, Stream Authentication, Authentication, Computer Operating Procedures, Hydraulics, Mathematical Models, Model Checking, Network Protocols, Software Reliability, Theorem Proving, Network Security
dc.subject Authentication protocols, Communicating sequential process, Communicating Sequential Processeses, Concurrent systems, Finite-state models, Hash chains, Infinite state, Process algebras, Protocol message, Security protocol verification, Security protocols, Stream authentication, Authentication, Computer operating procedures, Hydraulics, Mathematical models, Model checking, Network protocols, Software reliability, Theorem proving, Network security
dc.subject Security Protocol Verification
dc.subject Model Checking
dc.subject Communicating Sequential Processeses
dc.title Modeling efficient multi-chained stream signature protocol using communicating sequential processeses
dc.type Conference Object
dspace.entity.type Publication
gdc.author.scopusid 13408802300
gdc.author.scopusid 57225404680
gdc.author.scopusid 57210290205
gdc.bip.impulseclass C5
gdc.bip.influenceclass C5
gdc.bip.popularityclass C5
gdc.coar.type text::conference output
gdc.collaboration.industrial false
gdc.description.department
gdc.description.departmenttemp [Koltuksuz A.] Department of Computer Engineering, Yasar University, Izmir, Turkey; [Ozkan M.] Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey; [Kulahcioglu B.] Department of Computer Engineering, Izmir Institute of Technology, Izmir, Turkey
gdc.description.endpage 61
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 54
gdc.identifier.openalex W2089602107
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0.0
gdc.oaire.influence 2.3811355E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Security protocol verification
gdc.oaire.keywords Communicating Sequential Processeses
gdc.oaire.keywords Network security
gdc.oaire.keywords Processeses
gdc.oaire.popularity 4.164491E-10
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0211 other engineering and technologies
gdc.oaire.sciencefields 0102 computer and information sciences
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.sciencefields 01 natural sciences
gdc.openalex.collaboration National
gdc.openalex.fwci 0.0
gdc.openalex.normalizedpercentile 0.15
gdc.opencitations.count 0
gdc.plumx.mendeley 8
gdc.plumx.scopuscites 0
gdc.scopus.citedcount 0
gdc.virtual.author Koltuksuz, Ahmet Hasan
oaire.citation.endPage 61
oaire.citation.startPage 54
person.identifier.scopus-author-id Koltuksuz- Ahmet Hasan (13408802300), Ozkan- Murat (57225404680), Külahçioǧlu- Burcu (57210290205)
relation.isAuthorOfPublication 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isAuthorOfPublication.latestForDiscovery 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files