A hierarchy of authentication specifications

G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …

[PDF][PDF] A calculus for cryptographic protocols: The spi calculus

M Abadi, AD Gordon - Proceedings of the 4th ACM Conference on …, 1997 - dl.acm.org
We introduce the spi calculus, an extension of the pi calculus designed for the description
and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for …

Reachability analysis over term rewriting systems

G Feuillade, T Genet, V Viet Triem Tong - Journal of Automated Reasoning, 2004 - Springer
This paper surveys some techniques and tools for achieving reachability analysis over term
rewriting systems. The core of those techniques is a generic tree automata completion …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Strand spaces: Proving security protocols correct

FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …

Strand spaces: Why is a security protocol correct?

FJT Fábrega, JC Herzog… - Proceedings. 1998 IEEE …, 1998 - ieeexplore.ieee.org
A strand is a sequence of events; it represents either the execution of an action by a
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …

Inductive analysis of the internet protocol TLS

LC Paulson - ACM Transactions on Information and System Security …, 1999 - dl.acm.org
Internet browsers use security protocols to protect sensitive messages. An inductive analysis
of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle …

[KNIHA][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

A meta-notation for protocol analysis

I Cervesato, NA Durgin, PD Lincoln… - Proceedings of the …, 1999 - ieeexplore.ieee.org
Most formal approaches to security protocol analysis are based on a set of assumptions
commonly referred to as the" Dolev-Yao model". In this paper, we use a multiset rewriting …

Classification of Security Properties: (Part I: Information Flow)

R Focardi, R Gorrieri - International School on Foundations of Security …, 2000 - Springer
In the recent years, many formalizations of security properties have been proposed, most of
which are based on different underlying models and are consequently difficult to compare. A …