A symbolic approach to the analysis of security protocols (original) (raw)

Symbolic Approach to the Analysis of Security Protocols

john mullins

J. Univers. Comput. Sci., 2004

View PDFchevron_right

A logic for constraint-based security protocol analysis

Ari Saptawijaya

Security and Privacy, 2006 IEEE …, 2006

View PDFchevron_right

Protocol Engineering Applied to Formal Analysis of Security Systems

Juan José Ortega

Lecture Notes in Computer Science, 2002

View PDFchevron_right

Knowledge in security protocols: an operational semantics for BAN logic

Lambert Meertens

View PDFchevron_right

A Typed Specification for Security Protocols

Iosif Ignat

2006

View PDFchevron_right

A Derivation System for Security Protocols and its Logical Formalization

Anupam Datta

2003

View PDFchevron_right

Integrating Logics and Process Calculi for Cryptographic Protocol Analysis

Sujeet Shenoi

Security and Privacy in the Age of Uncertainty, 2003

View PDFchevron_right

Game Semantics Model for Security Protocols

mohamed saleh

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Process Algebraic Analysis of Cryptographic Protocols

Rosario Pugliese

Formal Methods for Distributed System Development, 2000

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey Soporte Formal para el Desarrollo de Protocolos de Seguridad: una Visión General

Raul Monroy

2008

View PDFchevron_right

Automated Design of Security Protocols

John Clark

Computational Intelligence, 2004

View PDFchevron_right

Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models

Riccardo Sisto

2008 Third International Conference on Availability, Reliability and Security, 2008

View PDFchevron_right

On Symbolic Analysis of Cryptographic Protocols

Akshay Patil

2005

View PDFchevron_right

Security protocols from the software verification perspective

Aleksy Schubert

View PDFchevron_right

A new method of verification of security protocols

Andrew Mironov

Cornell University - arXiv, 2017

View PDFchevron_right

A derivation system and compositional logic for security protocols

Anupam Datta

Journal of Computer Security, 2005

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Automated Logic-Based Technique for Formal Verification of Security Protocols

Anca Delia Jurcut

Journal of Advances in Computer Networks, 2018

View PDFchevron_right

Security protocols analysis: A SDL-based approach

Juan José Ortega

Computer Standards & Interfaces, 2005

View PDFchevron_right

Generic Verification of Security Protocols

Sahid Khan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Specifying and Verifying Crypto-Protocols at the Design Level

Elvinia Riccobene

2007

View PDFchevron_right

Towards a Metalogic for Security Protocol Analysis

Luca Vigan

2000

View PDFchevron_right

Automated Formal Methods for Security Protocol Engineering

Riccardo Sisto

Systems and Methodologies, 2012

View PDFchevron_right

OFMC: A Symbolic Model-Checker for Security Protocols

Luca Vigan

International Journal of Information Security, 2000

View PDFchevron_right

Formal verification logic for hybrid security protocols

Thomas Newe

Computer Systems: Science & Engineering, 2003

View PDFchevron_right

Relating multiset rewriting and process algebras for security protocol analysis

Gabriele Lenzini, Stefano Bistarelli

2005

View PDFchevron_right

Formally analysing a security protocol for replay attacks

Benjamin Long

Australian Software Engineering Conference (ASWEC'06), 2006

View PDFchevron_right

Approaches to Formal Verification of Security Protocols

Vikrant Chaplot

Arxiv preprint arXiv:1101.1815, 2011

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey

Raúl Monroy

Computación y Sistemas, 2008

View PDFchevron_right

A Hybrid Analysis for Security Protocols with State

Joshua Guttman

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Establishing and preserving protocol security goals

Joshua Guttman

View PDFchevron_right

A Logic of Belief and a Model Checking Algorithm for Security Protocols

L. Spalazzi

Formal Methods for Distributed System Development, 2000

View PDFchevron_right

Formal verification of security protocol implementations: a survey

Ajeje Brazorf

Formal Aspects of Computing, 2012

View PDFchevron_right