Computationally Sound, Automated Proofs for Security Protocols (original) (raw)

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Towards Producing Formally Checkable Security Proofs, Automatically

Jean Goubault-larrecq

2008 21st IEEE Computer Security Foundations Symposium, 2008

View PDFchevron_right

Computational soundness without protocol restrictions

Ankit Malik

Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12, 2012

View PDFchevron_right

On Symbolic Analysis of Cryptographic Protocols

Akshay Patil

2005

View PDFchevron_right

The inductive approach to verifying cryptographic protocols

Lawrence Paulson

View PDFchevron_right

Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys

Lawrence Paulson

1997

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

Proving Security Protocols Correct

Lawrence Paulson

1999

View PDFchevron_right

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Nadim Kobeissi

2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017

View PDFchevron_right

Automated Proof of Authentication Protocols in a Logic of Events

Mark Bickford

View PDFchevron_right

Computationally complete symbolic attacker and key exchange

Mitsuhiro Okada

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013

View PDFchevron_right

Security Proofs of Cryptographic Protocols

Eva Zuzana Jenčušová

2002

View PDFchevron_right

Approaches to Formal Verification of Security Protocols

Mohit Jain

Computing Research Repository, 2011

View PDFchevron_right

Soundness of Formal Encryption in the Presence of Active Adversaries

Bogdan Warinschi

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Proving Properties of Security Protocols by Induction

Lawrence Paulson

1997

View PDFchevron_right

Formal Methods for Assuring Security of Protocols

Shiu-Kai Chin

The Computer Journal, 2002

View PDFchevron_right

Generic Verification of Security Protocols

Sahid Khan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Proving secure properties of cryptographic protocols with knowledge based approach

maggie cheng

2005

View PDFchevron_right

Towards a Quantitative Analysis of Security Protocols

Paulo Mateus, Tiago Reis

Electronic Notes in Theoretical Computer Science, 2006

View PDFchevron_right

Inductive Proofs of Computational Secrecy

Anupam Datta

2007

View PDFchevron_right

Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols

Mitsuhiro Okada

2010

View PDFchevron_right

Proof Techniques for Cryptographic Processes

Rosario Pugliese

Siam Journal on Computing, 2001

View PDFchevron_right

Formal verification of security protocol implementations: a survey

Ajeje Brazorf

View PDFchevron_right

The faithfulness of abstract protocol analysis: Message authentication

Lenore Zuck

2001

View PDFchevron_right

A symbolic approach to the analysis of security protocols

John Mullins

2003

View PDFchevron_right

Real Cryptographic Protocol with an Insider Attacker : Improving Techniques for Proving Undecidability of Checking Security Goals

zhiyao liang

2008

View PDFchevron_right

Symbolic Approach to the Analysis of Security Protocols

john mullins

J. Univers. Comput. Sci., 2004

View PDFchevron_right

Mechanized proofs for a recursive authentication protocol

Lawrence Paulson

1997

View PDFchevron_right

Improving techniques for proving undecidability of checking cryptographic protocols

zhiyao liang

2008

View PDFchevron_right

1 Automatic Proofs of Protocols via Program Transformation

Alberto Pettorossi

2007

View PDFchevron_right

Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries

Yassine Lakhnech

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Automated Reasoning for Security Protocol Analysis

Jorge Cuellar

Journal of Automated Reasoning, 2006

View PDFchevron_right

A Framework for the Study of Cryptographic Protocols

Sampath Kannan

Lecture Notes in Computer Science

View PDFchevron_right