Authentication protocols for computer networks: I
Computer Networks and ISDN Systems
The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Introduction to the ISO specification language LOTOS
Computer Networks and ISDN Systems - Special Issue: Protocol Specification and Testing
Verification of network security protocols
Computers and Security
ACM Transactions on Computer Systems (TOCS)
A security scheme for resource sharing over a network
Computers and Security
Introduction to HOL: a theorem proving environment for higher order logic
Introduction to HOL: a theorem proving environment for higher order logic
A calculus of mobile processes, I
Information and Computation
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
An authentication and key distribution system for open network systems
ACM SIGOPS Operating Systems Review
Fail-stop processors: an approach to designing fault-tolerant computing systems
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
ASTRAL: An Assertion Language for Specifying Realtime Systems
ESEC '91 Proceedings of the 3rd European Software Engineering Conference
A Computer Aided Design of a Secure Registration Protocol
FORTE X / PSTV XVII '97 Proceedings of the IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE X) and Protocol Specification, Testing and Verification (PSTV XVII)
Designing Secure Key Exchange Protocols
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Formal Semantics for Authentication Logics
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Kerberos Version 4: Inductive Analysis of the Secrecy Goals
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
A Sound Logic for Analysing Electronic Commerce Protocols
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Formal Verification of Cryptographic Protocols: A Survey
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Formal Model for Systematic Design of Key Establishment Protocols
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
A timestamp model for determining real-time communications in intelligent networks
Computer Communications
On the security of public key protocols
IEEE Transactions on Information Theory
Protecting poorly chosen secrets from guessing attacks
IEEE Journal on Selected Areas in Communications
Analyzing encryption protocols using formal verification techniques
IEEE Journal on Selected Areas in Communications
Modelling audit security for Smart-Card payment schemes with UML-SEC
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
Specification-Based Test Generation for Security-Critical Systems Using Mutations
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
An Approach for the Design of Secure Communication in Embedded Systems
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Finite-state verification of the ebXML protocol
Electronic Commerce Research and Applications
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Architecting dependable systems IV
Authentication tests based on test type matrix
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.24 |
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the examination of robustness principles and application limitations. Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols. Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach. Finally, an outline is presented on current trends for the utilisation of formal methods for the analysis and verification of modern complicated protocols and protocol suites for the real commercial world.