The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
A lesson on authentication protocol design
ACM SIGOPS Operating Systems Review
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
On the security of recent protocols
Information Processing Letters
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Modelling and verifying key-exchange protocols using CSP and FDR
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
What do we mean by entity authentication?
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
On the security of SPLICE/AS - The authentication system in WIDE Internet
Information Processing Letters
Two attacks on Neuman-Stubblebine authentication protocols
Information Processing Letters
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
A New Logic for Electronic Commerce Protocols
AMAST '00 Proceedings of the 8th International Conference on Algebraic Methodology and Software Technology
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Analysis of a Security Protocol in µCRL
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Insider Fraud (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Metadata for Anomaly-Based Security Protocol Attack Deduction
IEEE Transactions on Knowledge and Data Engineering
Relating multiset rewriting and process algebras for security protocol analysis
Journal of Computer Security - Special issue on WITS'03
A derivation system and compositional logic for security protocols
Journal of Computer Security
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Journal of Systems Architecture: the EUROMICRO Journal
Towards Automated Secure Web Service Execution
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Middleware for Automated Implementation of Security Protocols
ESWC 2009 Heraklion Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Modeling and analysis of authentication protocols using colored Petri nets
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
ESOP'03 Proceedings of the 12th European conference on Programming
On-the-fly model checking of fair non-repudiation protocols
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
A logic programming based framework for security protocol verification
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Formal modelling and automatic detection of resource exhaustion attacks
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
Customizing protocol specifications for detecting resource exhaustion and guessing attacks
FMCO'10 Proceedings of the 9th international conference on Formal Methods for Components and Objects
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Timed traces and strand spaces
CSR'07 Proceedings of the Second international conference on Computer Science: theory and applications
Towards the attacker's view of protocol narrations (or, how to compile security protocols)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
Many security protocols have appeared in the literature, with aims such as agreeing upon a cryptographic key, or achieving authentication. However, many of these have been shown to be flawed. In this paper we present a number of new attacks upon security protocols, and discuss ways in which we may avoid designing incorrect protocols in the future.