Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
The foundation of a generic theorem prover
Journal of Automated Reasoning
ACM Transactions on Computer Systems (TOCS)
A calculus for cryptographic protocols
Information and Computation
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Communicating and mobile systems: the &pgr;-calculus
Communicating and mobile systems: the &pgr;-calculus
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Causal pi-Calculus for Biochemical Modelling
CMSB '03 Proceedings of the First International Workshop on Computational Methods in Systems Biology
Nordic Journal of Computing
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Tree automata with one memory set constraints and cryptographic protocols
Theoretical Computer Science - Automata, languages and programming
Analysis of LYSA-calculus with explicit confidentiality annotations
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Static validation of security protocols
Journal of Computer Security
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Electronic Notes in Theoretical Computer Science (ENTCS)
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
AMAST 2008 Proceedings of the 12th international conference on Algebraic Methodology and Software Technology
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Non-repudiation analysis using LySa with annotations
Computer Languages, Systems and Structures
Hi-index | 0.00 |
We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protocol passes the analysis then it is free of replay attacks and thus preserves freshness. The analysis has been implemented and applied to a number of protocols, including both original and corrected version of Needham-Schroeder protocol. The experiment results show that the analysis is able to capture potential replay attacks.