[PDF][PDF] An approach to the formal verification of cryptographic protocols

D Bolignano - Proceedings of the 3rd ACM Conference on Computer …, 1996 - dl.acm.org
We present an approach to the verification of authentication protocols. The approach is
based on the use of general purpose formal methods. It is complementary with modal logic …

A model of computation for the NRL protocol analyzer

C Meadows - Proceedings The Computer Security Foundations …, 1994 - ieeexplore.ieee.org
We develop a model of computation for the NRL Protocol Analyzer by modifying and
extending the model of computation for Burrows, Abadi, and Needham (BAN) logic (M …

AUTLOG-an advanced logic of authentication

V Kessler, G Wedel - Proceedings The Computer Security …, 1994 - ieeexplore.ieee.org
We present a modified version of the BAN logic which is implemented in PROLOG. The
modifications are motivated by the analysis of a lot of protocols. We analyze a challenge …

Authentication in distributed systems: A bibliography

A Liebl - ACM SIGOPS Operating Systems Review, 1993 - dl.acm.org
Security of distributed systems is a topic of growing importance. The security breaches of the
last few years (internet worm....) have demonstrated the need for additional research in this …

[PS][PS] On the automation of GNY logic

AM Mathuria, R Safavi-Naini… - Australian Computer …, 1995 - si.releases.ubuntu.com
Abstract The Gong, Needham and Yahalom (GNY) logic is a belief-based logic for analyzing
cryptographic protocols. It o ers signi cant advantages over its predecessor, the Burrows …

[CYTOWANIE][C] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - john wiley & sons

[PDF][PDF] A novel approach to the automation of logic-based security protocol verification.

R Dojen, T Coffey - WSEAS Transactions on Information Science …, 2004 - researchgate.net
Secure communications over insecure networks relies on the security of cryptographic
protocols. Formal verification is an essential step in the design of security protocols. In …

Спосіб криптографічно-строгої ідентифікації на основі хеш-перетворень з програмованими колізіями

ТО Стеблевець - 2023 - ela.kpi.ua
Анотація Дослідження присвячено задачі підвищення ефективності криптографічного
строгої ідентифікації віддалених користувачів в рамках криптографічної концепції …

[KSIĄŻKA][B] Analysis of cryptographic protocols via symbolic state space enumeration

A Huima - 1999 - tcs.hut.fi
Analysis of cryptographic protocols via symbolic state space enumeration Page 1 HELSINKI
UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Computer …

[PDF][PDF] A Tool of Analysis and Implementation of Security Protocolson Distributed Systems

L Mengual, C de la Puente - researchgate.net
In this paper we present an analysis and automatic implementation tool of security protocols
based on Techniques of Formal Description. A sufficiently complete and concise formal …