Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
The faithfulness of abstract protocol analysis: message authentication
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Experimenting with STA, a tool for automatic analysis of security protocols
Proceedings of the 2002 ACM symposium on Applied computing
Primitives for authentication in process algebras
Theoretical Computer Science
Authentication tests and the structure of bundles
Theoretical Computer Science
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
On the symbolic reduction of processes with cryptographic functions
Theoretical Computer Science
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
A comparison of three authentication properties
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Message Authentication through Non Interference
AMAST '00 Proceedings of the 8th International Conference on Algebraic Methodology and Software Technology
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Symbolic Trace Analysis of Cryptographic Protocols
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Formal Security Analysis with Interacting State Machines
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
A Framework for the Analysis of Security Protocols
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
A Uniform Approach for the Definition of Security Properties
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Authentication via Localized Names
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Typing correspondence assertions for communication protocols
Theoretical Computer Science
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Study on strand space model theory
Journal of Computer Science and Technology
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
The faithfulness of abstract protocol analysis: message authentication
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Preventing type flaw attacks on security protocols with a simplified tagging scheme
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
A method for symbolic analysis of security protocols
Theoretical Computer Science
Authentication primitives for secure protocol specifications
Future Generation Computer Systems - Special issue: Parallel computing technologies
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
Secure sessions for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Modelling the relative strength of security protocols
Proceedings of the 2nd ACM workshop on Quality of protection
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
An Approach for the Specification, Verification and Synthesis of Secure Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Electronic Notes in Theoretical Computer Science (ENTCS)
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
IEEE Transactions on Dependable and Secure Computing
A calculus of challenges and responses
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
On the relationships between models in protocol verification
Information and Computation
A problem solving mechanism for formal analysis of cryptographic protocols
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
On the protocol composition logic PCL
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Constraint Abstraction in Verification of Security Protocols
FAW '08 Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
Complexity of Checking Freshness of Cryptographic Protocols
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Safely composing security protocols
Formal Methods in System Design
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
Formal Aspects in Security and Trust
Verifying Multi-party Authentication Using Rank Functions and PVS
Formal Aspects in Security and Trust
Verification of authentication protocols for epistemic goals via SAT compilation
Journal of Computer Science and Technology
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols
Formal to Practical Security
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
A Decision Procedure for Structured Cryptographic Protocols
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
Automatic verification of correspondences for security protocols
Journal of Computer Security
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Analysing the BKE-security Protocol with μCRL
Electronic Notes in Theoretical Computer Science (ENTCS)
A Syntactic Criterion for Injectivity of Authentication Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
Electronic Notes in Theoretical Computer Science (ENTCS)
Metareasoning about Security Protocols using Distributed Temporal Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
The ASW Protocol Revisited: A Unified View
Electronic Notes in Theoretical Computer Science (ENTCS)
Tags for Multi-Protocol Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Relationship Between Web Services Security and Traditional Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Compositionality of Security Protocols: A Research Agenda
Electronic Notes in Theoretical Computer Science (ENTCS)
Completeness and Counter-Example Generations of a Basic Protocol Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
A Formalization of Credit and Responsibility Within the GNDC Schema
Electronic Notes in Theoretical Computer Science (ENTCS)
Privacy, abstract encryption and protocols: an ASM model - part I
ASM'03 Proceedings of the abstract state machines 10th international conference on Advances in theory and practice
Typing one-to-one and one-to-many correspondences in security protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
ESOP'03 Proceedings of the 12th European conference on Programming
A simple language for real-time cryptographic protocol analysis
ESOP'03 Proceedings of the 12th European conference on Programming
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
Computer Communications
Constraints solution for time sensitive security protocols
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
Formalizing and analyzing sender invariance
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Application of dependency graphs to security protocol analysis
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Developing security protocols by refinement
Proceedings of the 17th ACM conference on Computer and communications security
Degrees of security: protocol guarantees in the face of compromising adversaries
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
Caught in the maze of security standards
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
EC-RAC: enriching a capacious RFID attack collection
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
Formal modelling and automatic detection of resource exhaustion attacks
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Designing and verifying core protocols for location privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Deciding key cycles for security protocols
LPAR'06 Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
FOSSACS'06 Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Static analysis of authentication
Foundations of Security Analysis and Design III
Checking secrecy by means of partial order reduction
SAM'04 Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling
Formally based semi-automatic implementation of an open security protocol
Journal of Systems and Software
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
A logic for analysing subterfuge in delegation chains
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Formal analysis of CWA 14890-1
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A simple and robust handover authentication between HeNB and eNB in LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Security and Communication Networks
A security enhanced authentication and key distribution protocol for wireless networks
Security and Communication Networks
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Provably repairing the ISO/IEC 9798 standard for entity authentication
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Fairness in non-repudiation protocols
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Is cryptyc able to detect insider attacks?
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
From model-checking to automated testing of security protocols: bridging the gap
TAP'12 Proceedings of the 6th international conference on Tests and Proofs
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Managing trust and secrecy in identity management clouds
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
Journal of Medical Systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications
Automatic verification of protocols with lists of unbounded length
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Fast automatic security protocol generation
Journal of Computer Security
Provably repairing the ISO/IEC 9798 standard for entity authentication
Journal of Computer Security - Security and Trust Principles
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.01 |
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic literature about precisely what ``authentication'' means. In this paper we suggest that the appropriate authentication requirement will depend upon the use to which the protocol is put, and identify several possible definitions of ``authentication''. We formalize each definition using the process algebra CSP, use this formalism to study their relative strengths, and show how the model checker FDR can be used to test whether a system running the protocol meets such a specification.