A lesson on authentication protocol design
ACM SIGOPS Operating Systems Review
Communications of the ACM
A Formal Language for Cryptographic Protocol Requirements
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Extending NCP for protocols using public keys
Mobile Networks and Applications - Special issue: protocols for mobile environments
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
Lower and upper bounds for attacks on authentication protocols
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Inductive methods and contract-signing protocols
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Validating a Web service security abstraction by typing
Proceedings of the 2002 ACM workshop on XML security
Types for cyphers: thwarting mischief and malice with type theory
Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming
Handbook of automated reasoning
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Typing correspondence assertions for communication protocols
Theoretical Computer Science
Computing Symbolic Models for Verifying Cryptographic Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Automatic verification of cryptographic protocols: a logic programming approach
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
Automatic verification of security in payment protocols for electronic commerce
Enterprise information systems IV
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Correspondence assertions for process synchronization in concurrent communications
Journal of Functional Programming
Relating multiset rewriting and process algebras for security protocol analysis
Journal of Computer Security - Special issue on WITS'03
A decision procedure for the existence of a rank function
Journal of Computer Security
Secure sessions for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Computer-assisted verification of a protocol for certified email
Science of Computer Programming - Special issue: Static analysis symposium (SAS 2003)
Static validation of security protocols
Journal of Computer Security
A derivation system and compositional logic for security protocols
Journal of Computer Security
Information and Computation
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Weakening the perfect encryption assumption in Dolev-Yao adversaries
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
A type discipline for authorization policies
ACM Transactions on Programming Languages and Systems (TOPLAS) - Special Issue ESOP'05
Type-based cryptographic operations
Journal of Computer Security - Special issue on CSFW15
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
Specifying Properties of Concurrent Computations in CLF
Electronic Notes in Theoretical Computer Science (ENTCS)
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Verified implementations of the information card federated identity-management protocol
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Verifying policy-based web services security
ACM Transactions on Programming Languages and Systems (TOPLAS)
Verified interoperable implementations of security protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
A secure compiler for session abstractions
Journal of Computer Security - 20th IEEE Computer Security Foundations Symposium (CSF)
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
Secure compilation of a multi-tier web language
Proceedings of the 4th international workshop on Types in language design and implementation
Certification Using the Mobius Base Logic
Formal Methods for Components and Objects
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains
FOSSACS '09 Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
ESOP '09 Proceedings of the 18th European Symposium on Programming Languages and Systems: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Epistemic Logic for the Applied Pi Calculus
FMOODS '09/FORTE '09 Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems
Automatic verification of correspondences for security protocols
Journal of Computer Security
Type Inference for Correspondence Types
Electronic Notes in Theoretical Computer Science (ENTCS)
Planning and verifying service composition
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
Typechecking Safe Process Synchronization
Electronic Notes in Theoretical Computer Science (ENTCS)
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
A Formalization of Credit and Responsibility Within the GNDC Schema
Electronic Notes in Theoretical Computer Science (ENTCS)
Computer-assisted verification of a protocol for certified email
SAS'03 Proceedings of the 10th international conference on Static analysis
Compiling and verifying security protocols
LPAR'00 Proceedings of the 7th international conference on Logic for programming and automated reasoning
Typing one-to-one and one-to-many correspondences in security protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
Type-based verification of correspondence assertions for communication protocols
APLAS'07 Proceedings of the 5th Asian conference on Programming languages and systems
TAPIDO: trust and authorization via provenance and integrity in distributed objects
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
Foundations of security analysis and design IV
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Refinement types for secure implementations
ACM Transactions on Programming Languages and Systems (TOPLAS)
Model checking the security of multi-protocol systems
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Secrecy and authenticity types for secure distributed messaging
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Towards automatic analysis of election verifiability properties
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
What do we mean by entity authentication?
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Towards understanding pure publish/subscribe cryptographic protocols
Security'08 Proceedings of the 16th International conference on Security protocols
Call-by-contract for service discovery, orchestration and recovery
Rigorous software engineering for service-oriented systems
Type-based automated verification of authenticity in asymmetric cryptographic protocols
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
Analyzing iKP security in applied pi calculus
CIS'04 Proceedings of the First international conference on Computational and Information Science
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
Static analysis of authentication
Foundations of Security Analysis and Design III
A type discipline for authorization policies
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Securely propagating authentication in an ensemble of personal devices using single sign-on
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Verified reference implementations of WS-Security protocols
WS-FM'06 Proceedings of the Third international conference on Web Services and Formal Methods
Security issues in service composition
FMOODS'06 Proceedings of the 8th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Verification of security protocols using LOTOS-method and application
Computer Communications
Trace matching in a concurrent logical framework
Proceedings of the seventh international workshop on Logical frameworks and meta-languages, theory and practice
Is cryptyc able to detect insider attacks?
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
DKAL*: constructing executable specifications of authorization protocols
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
The need for capability policies
Proceedings of the 15th Workshop on Formal Techniques for Java-like Programs
Hi-index | 0.02 |
We specify authentication protocols as formal objects with precise syntax and semantics, anddefine a semantic model that characterizes protocol executions. We have identified two basic types of correctness properties, namely, correspondence and secrecy, that underlie the correctness concerns of authentication protocols. We define assertions for specifying these properties, and a formal semantics for their satisfaction in the semantic model. The Otway-Rees protocol is used to illustrate the semantic model and the basic correctness properties.