Strand spaces: Proving security protocols correct
FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …
encryption is used to provide authentication or to distribute cryptographic keys for new …
Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
Strand spaces: Why is a security protocol correct?
FJT Fábrega, JC Herzog… - Proceedings. 1998 IEEE …, 1998 - ieeexplore.ieee.org
A strand is a sequence of events; it represents either the execution of an action by a
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …
[책][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Constraint solving for bounded-process cryptographic protocol analysis
J Millen, V Shmatikov - Proceedings of the 8th ACM conference on …, 2001 - dl.acm.org
Constraint solving for bounded-process cryptographic protocol analysis Page 1 Constraint
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …
Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly …
Towards a completeness result for model checking of security protocols
G Lowe - Journal of computer security, 1999 - content.iospress.com
Abstract Model checking approaches to the analysis of security protocols have proved
remarkably successful. The basic approach is to produce a model of a small system running …
remarkably successful. The basic approach is to produce a model of a small system running …
Athena: A novel approach to efficient automatic security protocol analysis
We propose a new efficient automatic verification technique, Athena, for security protocol
analysis. It uses a new efficient representation–our extension to the Strand Space Model …
analysis. It uses a new efficient representation–our extension to the Strand Space Model …
The logic of authentication protocols
The rationale of authentication has been a topic of study for about a decade and a half. First
attempts at formal analysis of authentication protocols were not using logics per se, but were …
attempts at formal analysis of authentication protocols were not using logics per se, but were …
[PDF][PDF] On preventing replay attacks on security protocols
Replay attacks on security protocols have been dis-cussed for quite some time in the
literature. However, the efforts to address these attacks have been largely incomplete …
literature. However, the efforts to address these attacks have been largely incomplete …
Open issues in formal methods for cryptographic protocol analysis
C Meadows - Proceedings DARPA Information Survivability …, 2000 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
nearly twenty years, and recently has been showing signs of new maturity and …
nearly twenty years, and recently has been showing signs of new maturity and …