[BOOK][B] Reasoning about uncertainty
JY Halpern - 2017 - books.google.com
Formal ways of representing uncertainty and various logics for reasoning about it; updated
with new material on weighted probability measures, complexity-theoretic considerations …
with new material on weighted probability measures, complexity-theoretic considerations …
Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
A computationally sound mechanized prover for security protocols
B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
Towards a formal foundation of web security
We propose a formal model of web security based on an abstraction of the web platform and
use this model to analyze the security of several sample web mechanisms and applications …
use this model to analyze the security of several sample web mechanisms and applications …
An introduction to morphological neural networks
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …
pattern recognition problems. In this paper we introduce a novel class of neural networks …
Protocol composition logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …
protocols that use public and symmetric key cryptography. The logic is designed around a …
The foundational cryptography framework
A Petcher, G Morrisett - Principles of Security and Trust: 4th International …, 2015 - Springer
Abstract We present the Foundational Cryptography Framework (FCF) for develo** and
checking complete proofs of security for cryptographic schemes within a proof assistant. This …
checking complete proofs of security for cryptographic schemes within a proof assistant. This …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …
A modular correctness proof of IEEE 802.11 i and TLS
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …
network access point and user devices prior to user connectivity. The protocol consists of …
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …
means that a real system implements an ideal system (specification) in a way that preserves …