[BOOK][B] Reasoning about uncertainty

JY Halpern - 2017 - books.google.com
Formal ways of representing uncertainty and various logics for reasoning about it; updated
with new material on weighted probability measures, complexity-theoretic considerations …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

A computationally sound mechanized prover for security protocols

B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …

Towards a formal foundation of web security

D Akhawe, A Barth, PE Lam, J Mitchell… - 2010 23rd IEEE …, 2010 - ieeexplore.ieee.org
We propose a formal model of web security based on an abstraction of the web platform and
use this model to analyze the security of several sample web mechanisms and applications …

An introduction to morphological neural networks

GX Ritter, P Sussner - Proceedings of 13th International …, 1996 - ieeexplore.ieee.org
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …

Protocol composition logic (PCL)

A Datta, A Derek, JC Mitchell, A Roy - Electronic Notes in Theoretical …, 2007 - Elsevier
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …

The foundational cryptography framework

A Petcher, G Morrisett - Principles of Security and Trust: 4th International …, 2015 - Springer
Abstract We present the Foundational Cryptography Framework (FCF) for develo** and
checking complete proofs of security for cryptographic schemes within a proof assistant. This …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …

A modular correctness proof of IEEE 802.11 i and TLS

C He, M Sundararajan, A Datta, A Derek… - Proceedings of the 12th …, 2005 - dl.acm.org
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …

The reactive simulatability (RSIM) framework for asynchronous systems

M Backes, B Pfitzmann, M Waidner - Information and Computation, 2007 - Elsevier
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …