Casper: a compiler for the analysis of security protocols
Journal of Computer Security
Analysing Time Dependent Security Properties in CSP Using PVS
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
SAT-based model-checking for security protocols analysis
International Journal of Information Security
A simple language for real-time cryptographic protocol analysis
ESOP'03 Proceedings of the 12th European conference on Programming
√erics: a tool for verifying timed automata and estelle specifications
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Hi-index | 0.00 |
A new approach to verification of timed security protocols is given. The idea consists in modelling a finite number of users (including an intruder) of the computer network and their knowledge about secrets by timed automata. The runs of the product automaton of the above automata correspond to all the behaviours of the protocol for a fixed number of sessions. Verification is performed using the module BMC of the tool VerICS.