%0 Conference Proceedings %T Verification of Mutual Authentication Protocol for MobInfoSec System %+ Częstochowa University of Technology %+ West Pomeranian University of Technology Szczecin %+ Cardinal Stefan Wyszyński University (UKSW) %A Siedlecka-Lamch, Olga %A Fray, Imed, El %A Kurkowski, Mirosław %A Pejaś, Jerzy %Z Part 7: Various Aspects of Computer Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 14th Computer Information Systems and Industrial Management (CISIM) %C Warsaw, Poland %Y Khalid Saeed %Y Władysław Homenda %I Springer %3 Computer Information Systems and Industrial Management %V LNCS-9339 %P 461-474 %8 2015-09-24 %D 2015 %R 10.1007/978-3-319-24369-6_38 %K Authentication protocols %K One-to-many protocol %K Mobile device %K Sensitive information %K Secure communication channel %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X This paper presents a detailed analysis of the mutual authentication protocol developed especially for the system MobInfoSec - for a mobile device to share and protect classified information. MobInfoSec uses fine-grained access rules described by general access structures. In this paper we describe the architecture and functioning of the system, and the requirements imposed on cryptographic authentication protocols, resulting from both: standards, the collection of good practices, as well as directly from the vision of the system. The article contains a description of the protocol’s parts and formal analysis of its security. %G English %Z TC 8 %2 https://inria.hal.science/hal-01444488/document %2 https://inria.hal.science/hal-01444488/file/978-3-319-24369-6_38_Chapter.pdf %L hal-01444488 %U https://inria.hal.science/hal-01444488 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC8 %~ IFIP-CISIM %~ IFIP-LNCS-9339