Logics of time and computation
Logics of time and computation
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS
IEEE Transactions on Software Engineering
Reasoning about knowledge
A calculus for cryptographic protocols
Information and Computation
Proving security protocols with model checkers by data independence techniques
Journal of Computer Security
Strand spaces: proving security protocols correct
Journal of Computer Security
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Using encryption for authentication in large networks of computers
Communications of the ACM
Modal logic
Authentication tests and the structure of bundles
Theoretical Computer Science
On the relationship between strand spaces and multi-agent systems
ACM Transactions on Information and System Security (TISSEC)
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Honest Ideals on Strand Spaces
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
A derivation system and compositional logic for security protocols
Journal of Computer Security
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Searching for shapes in cryptographic protocols
TACAS'07 Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.01 |
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of participants). The logic's semantics is based on strand spaces. Several (secrecy or authentication) formulas are proven in general and are applied to the Needham-Schroeder(-Lowe), bilateral key exchange and the Otway-Rees protocols, as illustrations.