![(Desc)](https://nics.uma.es:8082/sites/all/modules/biblio/misc/arrow-desc.png)
First International Workshop on Security in Information Systems (SIS’02), pp. 61-71, April, 2002.
![](/images/icons/paper.png)
![](/images/icons/bibtex.gif)
Abstract
Authentication between protocol agents is widely studied in the cryptographic protocol analysis area. It is essential in a virtual environment to rely on protocol parties’ identity. In the academic literature there are many protocols that provide the authentication property. We present in this paper a new mechanism to verify authentication using SDL, general purpose specification language. We have defined a generic schema in SDL that allow us to specify a security system and check system behavior when a malicious agent ( the intruder ) is present. We have used the EKE authentication protocol to illustrate how the mechanism works.
![](https://nics.uma.es:8082/sites/default/files/covers/JavierLopez2002a.png)
![application/pdf PDF icon](/modules/file/icons/application-pdf.png)