**Peer Review Journal ** DOI on demand of Author (Charges Apply) ** Fast Review and Publicaton Process ** Free E-Certificate to Each Author

Current Issues
     2026:3/2

International Journal of Future Engineering Innovations

ISSN: (Print) | 3049-1215 (Online) | Impact Factor: 8.25 | Open Access

Survey of verification communication protocol security using computational models

Full Text (PDF)

Open Access - Free to Download

Download Full Article (PDF)

Abstract

With the rapid growth of technologies like the Internet of Things (IoT) and social media, securing communication channels against unauthorized access has become a critical priority. Protecting privacy and ensuring secure interactions requires protocols that not only encrypt data during transmission but also verify the identities of all parties involved. This paper examines widely-used computational models that validate the security of such protocols. It provides an overview of these models, their types, and their roles in analyzing and achieving mutual authentication and secure key exchange. By understanding these frameworks, we can better assess how communication protocols resist attacks and maintain confidentiality in dynamic environments.

How to Cite This Article

Sarah Basim Abed, Ghadeer Ibrahim Maki (2025). Survey of verification communication protocol security using computational models . International Journal of Future Engineering Innovations (IJFEI), 2(3), 38-45. DOI: https://doi.org/10.54660/IJFEI.2025.2.3.38-45

Share This Article: