On the relationship between strand spaces and multi-agent systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The faithfulness of abstract protocol analysis: message authentication
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Security analysis of the cliques protocols suites: first results
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Authentication tests and the structure of bundles
Theoretical Computer Science
On the relationship between strand spaces and multi-agent systems
ACM Transactions on Information and System Security (TISSEC)
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Strand Spaces and Rank Functions: More than Distant Cousins
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Security Protocol Design via Authentication Tests
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Information Processing Letters
Study on strand space model theory
Journal of Computer Science and Technology
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Modeling vulnerabilities of ad hoc routing protocols
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security properties: two agents are sufficient
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
The faithfulness of abstract protocol analysis: message authentication
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
A decision procedure for the existence of a rank function
Journal of Computer Security
A method for symbolic analysis of security protocols
Theoretical Computer Science
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Towards computationally sound symbolic analysis of key exchange protocols
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
To infinity and beyond or, avoiding the infinite in security protocol analysis
Proceedings of the 2006 ACM symposium on Applied computing
Bootstrapping multi-party ad-hoc security
Proceedings of the 2006 ACM symposium on Applied computing
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
Journal of Computer Security
Visual security protocol modeling
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
A rewriting-based inference system for the NRL Protocol analyzer and its meta-logical properties
Theoretical Computer Science - Automated reasoning for security protocol analysis
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
Compiling cryptographic protocols for deployment on the web
Proceedings of the 16th international conference on World Wide Web
Narrowing and Rewriting Logic: from Foundations to Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer
Electronic Notes in Theoretical Computer Science (ENTCS)
Authentication tests and disjoint encryption: A design method for security protocols
Journal of Computer Security - Special issue on CSFW15
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
A formal semantics for protocol narrations
Theoretical Computer Science
A Chart Semantics for the Pi-Calculus
Electronic Notes in Theoretical Computer Science (ENTCS)
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Towards an Automatic Analysis of Web Service Security
FroCoS '07 Proceedings of the 6th international symposium on Frontiers of Combining Systems
Unguessable Atoms: A Logical Foundation for Security
VSTTE '08 Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
Proceedings of the 15th ACM conference on Computer and communications security
Minimal backups of cryptographic protocol runs
Proceedings of the 6th ACM workshop on Formal methods in security engineering
State Space Reduction in the Maude-NRL Protocol Analyzer
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Efficient Authentication and Key Agreement Protocol in RFID System
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Cyber-Physical Systems and Events
Software-Intensive Systems and New Computing Paradigms
Complexity of Checking Freshness of Cryptographic Protocols
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Goal-Equivalent Secure Business Process Re-engineering
Service-Oriented Computing - ICSOC 2007 Workshops
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Automatic verification of correspondences for security protocols
Journal of Computer Security
Semantics and logic for security protocols
Journal of Computer Security
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Electronic Notes in Theoretical Computer Science (ENTCS)
Metareasoning about Security Protocols using Distributed Temporal Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
A Coordination-based Methodology for Security Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Compositionality of Security Protocols: A Research Agenda
Electronic Notes in Theoretical Computer Science (ENTCS)
Enhanced strand space for secure protocol analysis
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
One extension of authentication test based on strand space model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Privacy, abstract encryption and protocols: an ASM model - part I
ASM'03 Proceedings of the abstract state machines 10th international conference on Advances in theory and practice
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
Verification of authentication protocols based on the binding relation
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Security properties: two agents are sufficient
ESOP'03 Proceedings of the 12th European conference on Programming
Handling encryption in an analysis for secure information flow
ESOP'03 Proceedings of the 12th European conference on Programming
Verifying smart card applications: an ASM approach
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Failures: their definition, modelling and analysis
ICTAC'07 Proceedings of the 4th international conference on Theoretical aspects of computing
Normal proofs in intruder theories
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Secrecy analysis in protocol composition logic
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Authentication tests based on test type matrix
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Model checking detectability of attacks in multiagent systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Sequential protocol composition in maude-NPA
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Automated refinement of security protocols
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Some encounters on the productive use of a failed proof attempt or a counterexample
MICAI'10 Proceedings of the 9th Mexican international conference on Advances in artificial intelligence: Part I
Multi-Attacker Protocol Validation
Journal of Automated Reasoning
Rethinking about guessing attacks
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption
Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming
Towards understanding pure publish/subscribe cryptographic protocols
Security'08 Proceedings of the 16th International conference on Security protocols
Protocol analysis modulo combination of theories: a case study in Maude-NPA
STM'10 Proceedings of the 6th international conference on Security and trust management
Honoring Carolyn Talcott's contributions to science
Formal modeling
${\mathcal PS}$-LTL for constraint-based security protocol analysis
ICLP'05 Proceedings of the 21st international conference on Logic Programming
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Game semantics model for security protocols
ICFEM'05 Proceedings of the 7th international conference on Formal Methods and Software Engineering
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Trusted multiplexing of cryptographic protocols
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Security protocol analysis with improved authentication tests
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Optimized initiation phases for anonymous auction protocols
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Static analysis of authentication
Foundations of Security Analysis and Design III
Modeling for security verification of a cryptographic protocol with MAC payload
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
The inductive approach to strand space
FORTE'05 Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
A formal approach for reasoning about a class of diffie-hellman protocols
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysing applications layered on unilaterally authenticating protocols
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Timed traces and strand spaces
CSR'07 Proceedings of the Second international conference on Computer Science: theory and applications
Sessions and separability in security protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Computationally complete symbolic attacker and key exchange
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Decision Support Systems
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.00 |
A strand is a sequence of events; it represents either anexecution by a legitimate party in a security protocol or else asequence of actions by a penetrator. A strand space is a collectionof strands, equipped with a graph structure generated by causalinteraction. In this framework, protocol correctness claims may beexpressed in terms of the connections between strands of differentkinds.Preparing for a first example, the Needham-Schroeder-Loweprotocol, we prove a lemma that gives a bound on the abilities ofthe penetrator in any protocol. Our analysis of the example gives adetailed view of the conditions under which it achievesauthentication and protects the secrecy of the values exchanged. Wealso use our proof methods to explain why the originalNeedham-Schroeder protocol fails.Before turning to a second example, we introduce ideals as amethod to prove additional bounds on the abilities of thepenetrator. We can then prove a number of correctness properties ofthe Otway-Rees protocol, and we clarify its limitations.We believe that our approach is distinguished from other work bythe simplicity of the model, the precision of the results itproduces, and the ease of developing intelligible and reliableproofs even without automated support.