Twenty years of rewriting logic

J Meseguer - The Journal of Logic and Algebraic Programming, 2012‏ - Elsevier
Rewriting logic is a simple computational logic that can naturally express both concurrent
computation and logical deduction with great generality. This paper provides a gentle …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012‏ - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

[ספר][B] Some tools

M Clavel, F Durán, S Eker, P Lincoln, N Martí-Oliet… - 2007‏ - Springer
This chapter describes some existing Maude-based tools that are available for download.
The first section describes tools concerned with analysis of either Maude specifications, or of …

[PS][PS] An E cient Cryptographic Protocol Verifier Based on Prolog Rules

B Blanchet - 14th IEEE Computer Security Foundations Workshop …, 2001‏ - csl.sri.com
An E cient Cryptographic Protocol Veri er Based on Prolog Rules Page 1 An E cient
Cryptographic Protocol Veri er Based on Prolog Rules Bruno Blanchet INRIA Rocquencourt …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012‏ - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

A meta-notation for protocol analysis

I Cervesato, NA Durgin, PD Lincoln… - Proceedings of the …, 1999‏ - ieeexplore.ieee.org
Most formal approaches to security protocol analysis are based on a set of assumptions
commonly referred to as the" Dolev-Yao model". In this paper, we use a multiset rewriting …

Rewriting logic: roadmap and bibliography

N Martı-Oliet, J Meseguer - Theoretical Computer Science, 2002‏ - Elsevier
The theory and applications of rewriting logic have been vigorously developed by
researchers all over the world during the past eleven years. The attached bibliography …

Protocol insecurity with finite number of sessions is NP-complete

M Rusinowitch, M Turuani - 2001‏ - inria.hal.science
We investigate the complexity of the protocol insecurity problem for a finite number of
sessions (fixed number of interleaved runs). We show that this problem is NP-complete in a …

Multiset rewriting and the complexity of bounded security protocols

N Durgin, P Lincoln, J Mitchell… - Journal of Computer …, 2004‏ - journals.sagepub.com
We formalize the Dolev–Yao model of security protocols, using a notation based on multiset
rewriting with existentials. The goals are to provide a simple formal notation for describing …

Protocol insecurity with a finite number of sessions and composed keys is NP-complete

M Rusinowitch, M Turuani - Theoretical Computer Science, 2003‏ - Elsevier
We investigate the complexity of the protocol insecurity problem for a finite number of
sessions (fixed number of interleaved runs). We show that this problem is NP-complete with …