PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Reasoning about knowledge
First-order modal logic
Epistemic Logic for AI and Computer Science
Epistemic Logic for AI and Computer Science
GSM Networks: Protocols, Terminology, and Implementation
GSM Networks: Protocols, Terminology, and Implementation
Formal Semantics for Authentication Logics
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
On BAN logic and hash functions or: how an unjustified inference rule causes problems
Autonomous Agents and Multi-Agent Systems
An Approach for the Design of Secure Communication in Embedded Systems
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Belief change and cryptographic protocol verification
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Toward Reasoning about Security Protocols: A Semantic Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
L-PEP: a logic to reason about privacy-enhancing cryptography protocols
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Hi-index | 0.00 |
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.