ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
On BAN Logics for Industrial Security Protocols
CEEMAS '01 Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Nature---Inspired Synthesis of Rational Protocols
Proceedings of the 10th international conference on Parallel Problem Solving from Nature: PPSN X
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
On BAN logic and hash functions or: how an unjustified inference rule causes problems
Autonomous Agents and Multi-Agent Systems
Formal methods for cryptographic protocol analysis: emerging issues and trends
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In recent years, many cryptography protocols have been designed for many different scenarios, with the purpose of preserving security of communications as well as privacy and anonymity of participant entities. In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. The main goal of this work is the proposal of a logic to reason about privacy-enhancing monotonic and non-monotonic cryptography protocols. The new logic will be called L-PEP and it extends the existing Rubin's logic of beliefs.