Computationally Sound, Automated Proofs for Security Protocols (original) (raw)
Related papers
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols
Lecture Notes in Computer Science, 2003
Towards Producing Formally Checkable Security Proofs, Automatically
2008 21st IEEE Computer Security Foundations Symposium, 2008
Computational soundness without protocol restrictions
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12, 2012
On Symbolic Analysis of Cryptographic Protocols
2005
The inductive approach to verifying cryptographic protocols
Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys
1997
Formal automatic verification of authentication cryptographic protocols
Proceedings First IEEE International Conference on Formal Engineering Methods, 1997
Proving Security Protocols Correct
1999
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017
Automated Proof of Authentication Protocols in a Logic of Events
Computationally complete symbolic attacker and key exchange
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013
Security Proofs of Cryptographic Protocols
2002
Approaches to Formal Verification of Security Protocols
Computing Research Repository, 2011
Soundness of Formal Encryption in the Presence of Active Adversaries
Lecture Notes in Computer Science, 2004
Proving Properties of Security Protocols by Induction
1997
Formal Methods for Assuring Security of Protocols
The Computer Journal, 2002
Generic Verification of Security Protocols
Lecture Notes in Computer Science, 2005
Proving secure properties of cryptographic protocols with knowledge based approach
2005
Towards a Quantitative Analysis of Security Protocols
Electronic Notes in Theoretical Computer Science, 2006
Inductive Proofs of Computational Secrecy
2007
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
2010
Proof Techniques for Cryptographic Processes
Siam Journal on Computing, 2001
Formal verification of security protocol implementations: a survey
The faithfulness of abstract protocol analysis: Message authentication
2001
A symbolic approach to the analysis of security protocols
2003
2008
Symbolic Approach to the Analysis of Security Protocols
J. Univers. Comput. Sci., 2004
Mechanized proofs for a recursive authentication protocol
1997
Improving techniques for proving undecidability of checking cryptographic protocols
2008
1 Automatic Proofs of Protocols via Program Transformation
2007
Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries
Lecture Notes in Computer Science, 2005
Automated Reasoning for Security Protocol Analysis
Journal of Automated Reasoning, 2006
A Framework for the Study of Cryptographic Protocols
Lecture Notes in Computer Science