Protocol composition logic (PCL)

A Datta, A Derek, JC Mitchell, A Roy - Electronic Notes in Theoretical …, 2007 - Elsevier
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …

A modular correctness proof of IEEE 802.11 i and TLS

C He, M Sundararajan, A Datta, A Derek… - Proceedings of the 12th …, 2005 - dl.acm.org
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …

A derivation system and compositional logic for security protocols

A Datta, A Derek, JC Mitchell… - Journal of Computer …, 2005 - content.iospress.com
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …

Methods and apparatuses for user-verifiable trusted path in the presence of malware

JM McCune, AM Perrig, A Datta, VD Gligor… - US Patent …, 2014 - Google Patents
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …

Probabilistic polynomial-time semantics for a protocol security logic

A Datta, A Derek, JC Mitchell, V Shmatikov… - … Colloquium on Automata …, 2005 - Springer
We describe a cryptographically sound formal logic for proving protocol security properties
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …

[BOOK][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

[PDF][PDF] Categorical composable cryptography.

A Broadbent, M Karvonen - FoSSaCS, 2022 - library.oapen.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …

Secure protocol composition

A Datta, A Derek, JC Mitchell, D Pavlovic - … of the 2003 ACM workshop on …, 2003 - dl.acm.org
Modular composition of security mechanisms is complicated by the way that one mechanism
may reveal information that interferes with the security of another. We develop methods for …

Categorical composable cryptography: extended version

A Broadbent, M Karvonen - Logical Methods in Computer …, 2024 - lmcs.episciences.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …