The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
A knowledge-based analysis of zero knowledge
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
An axiomatic basis for computer programming
Communications of the ACM
Authentication: A Practical Study in Belief and Action
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Knowledge and common knowledge in a distributed environment
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A chat room assignment for teaching network security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Entity Authentication and Key Distribution
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
Formal verification: an imperative step in the design of security protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of a mobile communication security protocol
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
On BAN logic and hash functions or: how an unjustified inference rule causes problems
Autonomous Agents and Multi-Agent Systems
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
An adaptive computational trust model for mobile ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A Secure Routing Algorithm for MANET
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A new authentication and key exchange protocol for insecure networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Automatic detection of attacks on cryptographic protocols: a case study
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Analyzing security protocols in hierarchical networks
ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Research: Key management for a secure LAN-SMDS network
Computer Communications
Insider attacks and privacy of RFID protocols
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Hi-index | 0.00 |
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws.A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper, we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.