Ahmet Hasan KoltuksuzBurcu KülahçioǧluMurat OzkanKulahcioglu, BurcuOzkan, MuratKoltuksuz, Ahmet2025-10-062010978076954087010.1109/SSIRI-C.2010.272-s2.0-77956120549https://www.scopus.com/inward/record.uri?eid=2-s2.0-77956120549&doi=10.1109%2FSSIRI-C.2010.27&partnerID=40&md5=21e21f453bc128a3dab7cafacdcd8ea8https://gcris.yasar.edu.tr/handle/123456789/10281https://doi.org/10.1109/SSIRI-C.2010.27Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.Englishinfo:eu-repo/semantics/openAccessModel Checking, Security Protocol Verification, Timed Automata, Application Area, Authentication Protocols, Automata-theoretic Approach, Automatic Verification Tools, Research Areas, Security Protocol Verification, Security Protocols, Timed Automata, Verification Tools, Automata Theory, Formal Languages, Interactive Computer Systems, Model Checking, Network Protocols, Real Time Systems, Software Reliability, Network SecurityApplication area, Authentication protocols, Automata-theoretic approach, Automatic verification tools, Research areas, Security protocol verification, Security protocols, Timed Automata, Verification tools, Automata theory, Formal languages, Interactive computer systems, Model checking, Network protocols, Real time systems, Software reliability, Network securitySecurity Protocol VerificationTimed AutomataModel CheckingUtilization of timed automata as a verification tool for security protocolsConference Object