Modeling concurrency with partial orders
International Journal of Parallel Programming
ACM Transactions on Computer Systems (TOCS)
Strand spaces: proving security protocols correct
Journal of Computer Security
Guarded Transitions in Evolving Specifications
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Composition and Refinement of Behavioral Specifications
Proceedings of the 16th IEEE international conference on Automated software engineering
A Compositional Logic for Protocol Correctness
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
A derivation system and compositional logic for security protocols
Journal of Computer Security
Systems Biology: Properties of Reconstructed Networks
Systems Biology: Properties of Reconstructed Networks
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
A Computationally Sound Mechanized Prover for Security Protocols
IEEE Transactions on Dependable and Secure Computing
User-aided data authentication
International Journal of Security and Networks
Conditioned-safe ceremonies and a user study of an application to web authentication
Proceedings of the 5th Symposium on Usable Privacy and Security
Optimised to Fail: Card Readers for Online Banking
Financial Cryptography and Data Security
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
Searching for shapes in cryptographic protocols
TACAS'07 Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems
Networks: An Introduction
A Machine-Checked Formalization of Sigma-Protocols
CSF '10 Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
Journal of Automated Reasoning
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Toward a broader view of security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
SAS-Based authenticated key agreement
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Hi-index | 0.00 |
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension of our previous Protocol Derivation Logic. Both formalisms are geared towards graphic reasoning. We illustrate its workings by analysing a popular form of two-factor authentication.