Ahmet Hasan KoltuksuzMurat OzkanBurcu KülahçioǧluKulahcioglu, BurcuOzkan, MuratKoltuksuz, Ahmet2025-10-062010978076954087010.1109/SSIRI-C.2010.232-s2.0-77956116875https://www.scopus.com/inward/record.uri?eid=2-s2.0-77956116875&doi=10.1109%2FSSIRI-C.2010.23&partnerID=40&md5=f81fb8da9279cf426d25389d871322b6https://gcris.yasar.edu.tr/handle/123456789/10282https://doi.org/10.1109/SSIRI-C.2010.23Communicating Sequential Processes (CSP) is a process algebra designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages forming hash chains which introduces difficulties for modeling and verification. In this paper, we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.Englishinfo:eu-repo/semantics/openAccessCommunicating Sequential Processeses, Model Checking, Security Protocol Verification, Authentication Protocols, Communicating Sequential Process, Communicating Sequential Processeses, Concurrent Systems, Finite-state Models, Hash Chains, Infinite State, Process Algebras, Protocol Message, Security Protocol Verification, Security Protocols, Stream Authentication, Authentication, Computer Operating Procedures, Hydraulics, Mathematical Models, Model Checking, Network Protocols, Software Reliability, Theorem Proving, Network SecurityAuthentication protocols, Communicating sequential process, Communicating Sequential Processeses, Concurrent systems, Finite-state models, Hash chains, Infinite state, Process algebras, Protocol message, Security protocol verification, Security protocols, Stream authentication, Authentication, Computer operating procedures, Hydraulics, Mathematical models, Model checking, Network protocols, Software reliability, Theorem proving, Network securitySecurity Protocol VerificationModel CheckingCommunicating Sequential ProcessesesModeling efficient multi-chained stream signature protocol using communicating sequential processesesConference Object