The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
ACM SIGOPS Operating Systems Review
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Introduction to HOL: a theorem proving environment for higher order logic
Introduction to HOL: a theorem proving environment for higher order logic
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Server-Process Restrictiveness in HOL
HUG '93 Proceedings of the 6th International Workshop on Higher Order Logic Theorem Proving and its Applications
Deciding Cryptographic Protocol Adequacy with HOL
Proceedings of the 8th International Workshop on Higher Order Logic Theorem Proving and Its Applications
A Mechanized Logic for Secure Key Escrow Protocol Verification
Proceedings of the 8th International Workshop on Higher Order Logic Theorem Proving and Its Applications
Deciding Cryptographic Protocol Adequacy with HOL: The Implementation
TPHOLs '96 Proceedings of the 9th International Conference on Theorem Proving in Higher Order Logics
Providing Tractable Security Analysis in HOL
Proceedings of the 7th International Workshop on Higher Order Logic Theorem Proving and Its Applications
Verifying The Correctness Of Cryptographic Protocols Using "Convince"
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
On the security of public key protocols
On the security of public key protocols
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Visual security protocol modeling
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Verifying cryptographic protocols for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Preservation of epistemic properties in security protocol implementations
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Hi-index | 0.04 |
This paper describes a Higher Order Logic (HOL) theory formalizing an extended version of the Gong, Needham, Yahalom (GNY) belief logic, a theory used by software that automatically proves authentication properties of cryptographic protocols. The theory's extensions to the GNY logic include being able to specify protocol properties at intermediate stages and being able to specify protocols that use multiple encryption and hash operations, message authentication codes, computed values (e.g., hash codes) as keys, and key-exchange algorithms.