The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
A knowledge-based analysis of zero knowledge
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
An axiomatic basis for computer programming
Communications of the ACM
Authentication: A Practical Study in Belief and Action
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Knowledge and common knowledge in a distributed environment
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Recent trends in experimental operating systems research
PODC '93 Proceedings of the twelfth annual ACM symposium on Principles of distributed computing
Adding time to a logic of authentication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A lesson on authentication protocol design
ACM SIGOPS Operating Systems Review
An alternate explanation of two BAN-logic “failures”
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Using belief to reason about cache coherence
PODC '94 Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Model checking software systems: a case study
SIGSOFT '95 Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
A Model for Secure Protocols and Their Compositions
IEEE Transactions on Software Engineering
A Formal Language for Cryptographic Protocol Requirements
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
ACM SIGOPS Operating Systems Review
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
Extending NCP for protocols using public keys
Mobile Networks and Applications - Special issue: protocols for mobile environments
New design concepts for an intelligent Internet
Communications of the ACM
A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Security protocol for IEEE 802.11 wireless local area network
Mobile Networks and Applications - Special issue on wireless LANs
Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
Generalized certificate revocation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
A coordination language for mobile components
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Programming language methods in computer security
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
SAFKASI: a security mechanism for language-based systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Mobile agent security with the IPEditor development tool and the mobile UNITY language
Proceedings of the fifth international conference on Autonomous agents
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
Trust: benefits, models, and mechanisms
Secure Internet programming
Report on the computer security foundations workshop VI
ACM SIGSAC Review
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
On the relationship between strand spaces and multi-agent systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The faithfulness of abstract protocol analysis: message authentication
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
An approach to finding the attacks on the cryptographic protocols
ACM SIGOPS Operating Systems Review
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Primitives for authentication in process algebras
Theoretical Computer Science
Authentication tests and the structure of bundles
Theoretical Computer Science
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
Mark, a Reasoning Kit for Mobility
Automated Software Engineering
Logical Cryptanalysis as a SAT Problem
Journal of Automated Reasoning
On the relationship between strand spaces and multi-agent systems
ACM Transactions on Information and System Security (TISSEC)
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Sleepers and workaholics: caching strategies in mobile environments (extended version)
The VLDB Journal — The International Journal on Very Large Data Bases
A secure address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Mobile Computation: Calculus and Languages (A Tutorial)
ASIAN '98 Proceedings of the 4th Asian Computing Science Conference on Advances in Computing Science
Logical Foundations for Reasoning about Trust in Secure Digital Communication
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Verification of Payment Protocols via MultiAgent Model Checking
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Model Checking-Based Analysis of Multiagent Systems
FAABS '00 Proceedings of the First International Workshop on Formal Approaches to Agent-Based Systems-Revised Papers
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
FLOPS '01 Proceedings of the 5th International Symposium on Functional and Logic Programming
A New Semantics of Authentication Logic
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Reasoning about Accountability within Delegation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Practical Reasoning about Accountability in Electronic Commerce Protocols
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Model Checking Security Protocols Using a Logic of Belief
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Partial Order Reductions for Security Protocol Verification
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Analyzing Cryptographic Protocols in a Reactive Framework
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
On BAN Logics for Industrial Security Protocols
CEEMAS '01 Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CardS4: Modal Theorem Proving on Java Smartcards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
CardKt: Automated Multi-modal Deduction on Java Cards for Multi-application Security
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Optimistic Trust with Realistic eNvestigators (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Revised Papers from the 8th International Workshop on Security Protocols
Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
The Expressive Power of Horn Monadic Linear Logic
CSL '01 Proceedings of the 15th International Workshop on Computer Science Logic
Smartcards: Hot to Put them to Use in a User-Centric System
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
ISC '01 Proceedings of the 4th International Conference on Information Security
Lazy Infinite-State Analysis of Security Protocols
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Design guidelines for robust Internet protocols
ACM SIGCOMM Computer Communication Review
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Authentication via Localized Names
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
IEEE Pervasive Computing
Ignore at your peril - towards a logic for ignorance
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
A Compositional Logic for Protocol Correctness
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Extending NCP for protocols using public keys
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
Towards a logic for wide-area Internet routing
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
Security design for a new local area network AULWLAN
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
An approach to the formal verification of the three-principal cryptographic protocols
ACM SIGOPS Operating Systems Review
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Stepwise development of security protocols: a speech act-oriented approach
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
The faithfulness of abstract protocol analysis: message authentication
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
A collaborative approach to autonomic security protocols
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Encyclopedia of Computer Science
ACM Transactions on Information and System Security (TISSEC)
The study on the application of BAN logic in formal analysis of authentication protocols
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Deciding knowledge properties of security protocols
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Authentication primitives for secure protocol specifications
Future Generation Computer Systems - Special issue: Parallel computing technologies
BAR fault tolerance for cooperative services
Proceedings of the twentieth ACM symposium on Operating systems principles
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
PeerAccess: a logic for distributed authorization
Proceedings of the 12th ACM conference on Computer and communications security
Risk assessment in distributed authorization
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
Living assistance systems: an ambient intelligence approach
Proceedings of the 28th international conference on Software engineering
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
Linear and affine logics with temporal, spatial and epistemic operators
Theoretical Computer Science
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Static validation of security protocols
Journal of Computer Security
A derivation system and compositional logic for security protocols
Journal of Computer Security
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Computationally sound secrecy proofs by mechanized flow analysis
Proceedings of the 13th ACM conference on Computer and communications security
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
Cryptographic Pattern Matching
Electronic Notes in Theoretical Computer Science (ENTCS)
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
The many faces of systems research: and how to evaluate them
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
Providing authentication to messages signed with a smart card in hostile environments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Fast, automatic checking of security protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Verifying cryptographic protocols for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Simulation Based Validation Of Authentication Protocols
Journal of Integrated Design & Process Science
Towards an active network architecture
ACM SIGCOMM Computer Communication Review
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Electronic Notes in Theoretical Computer Science (ENTCS)
Preservation of epistemic properties in security protocol implementations
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Perfect cryptography, S5 knowledge, and algorithmic knowledge
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Electronic Notes in Theoretical Computer Science (ENTCS)
Formalising theories of trust for authentication protocols
Information Systems Frontiers
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Capturing industry experience for an effective information security assessment
International Journal of Information Systems and Change Management
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Verification of the TESLA protocol in MCMAS-X
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
On the protocol composition logic PCL
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Risk management for distributed authorization
Journal of Computer Security
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Cryptographically-masked flows
Theoretical Computer Science
Information systems security and human behaviour
Behaviour & Information Technology
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Advanced method for cryptographic protocol verification
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Programming with Live Distributed Objects
ECOOP '08 Proceedings of the 22nd European conference on Object-Oriented Programming
A Model for Trust Metrics Analysis
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
Proceedings of the 15th ACM conference on Computer and communications security
The layered games framework for specifications and analysis of security protocols
International Journal of Applied Cryptography
Science of Computer Programming
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Entity Based Message Authentication System
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks
Information Networking. Towards Ubiquitous Networking and Services
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Analytic Tableaux for Verifying Agent Beliefs
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
An interoperable context sensitive model of trust
Journal of Intelligent Information Systems
From Binary Trust to Graded Trust in Information Sources: A Logical Perspective
Trust in Agent Societies
Modal tableaux for verifying stream authentication protocols
Autonomous Agents and Multi-Agent Systems
On BAN logic and hash functions or: how an unjustified inference rule causes problems
Autonomous Agents and Multi-Agent Systems
Mobile services access and payment through reusable tickets
Computer Communications
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
LDYIS: a Framework for Model Checking Security Protocols
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Electronic Notes in Theoretical Computer Science (ENTCS)
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
A PK-SIM card based end-to-end security framework for SMS
Computer Standards & Interfaces
Verification of authentication protocols for epistemic goals via SAT compilation
Journal of Computer Science and Technology
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
Epistemic Logic for the Applied Pi Calculus
FMOODS '09/FORTE '09 Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems
Theories of Trust for Communication Protocols
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks
Journal of Systems and Software
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
An Approach for the Design of Secure Communication in Embedded Systems
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
A General Approach to the Verification of Cryptographic Protocols Using Answer Set Programming
LPNMR '09 Proceedings of the 10th International Conference on Logic Programming and Nonmonotonic Reasoning
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
Belief change and cryptographic protocol verification
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Variable forgetting in reasoning about knowledge
Journal of Artificial Intelligence Research
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
On a formal framework for security properties
Computer Standards & Interfaces
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Trust based security auto-configuration for smart assisted living environments
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
Security Analysis of AN.ON's Payment Scheme
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
ATVA '09 Proceedings of the 7th International Symposium on Automated Technology for Verification and Analysis
Modeling and Verification of Privacy Enhancing Protocols
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
EURASIP Journal on Wireless Communications and Networking
Toward Reasoning about Security Protocols: A Semantic Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing the BKE-security Protocol with μCRL
Electronic Notes in Theoretical Computer Science (ENTCS)
A Syntactic Criterion for Injectivity of Authentication Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
Securing Statically-verified Communications Protocols Against Timing Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
A Coordination-based Methodology for Security Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Nonmonotonic Trust Management for P2P Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Authentication primitives for secure protocol specifications
Future Generation Computer Systems - Special issue: Parallel computing technologies
Modeling and analysis of authentication protocols using colored Petri nets
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A practical study on security of agent-based ubiquitous computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Ambient intelligence in assisted living: enable elderly people to handle future interfaces
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Pre-authentication for fast handoff in wireless mesh networks with mobile APs
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
ESOP'03 Proceedings of the 12th European conference on Programming
Handling encryption in an analysis for secure information flow
ESOP'03 Proceedings of the 12th European conference on Programming
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Integrating verification, testing, and learning for cryptographic protocols
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Evaluation of P2P search algorithms for discovering trust paths
EPEW'07 Proceedings of the 4th European performance engineering conference on Formal methods and stochastic models for performance evaluation
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A formal analysis for capturing replay attacks in cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Accountability in centralized payment environments
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Iterative specialisation of horn clauses
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
The layered games framework for specifications and analysis of security protocols
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Secure protocol for fast authentication in EAP-based wireless networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Calibrating the power of schedulers for probabilistic polynomial-time calculus
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Using session identifiers as authentication tokens
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
An authentication model for delegation, attribution and least privilege
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Using deductive knowledge to improve cryptographic protocol verification
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
Formalization of smart metering requirements
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Using trust-based information aggregation for predicting security level of systems
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A runs-and-systems semantics for logics of announcements
LOFT'08 Proceedings of the 8th international conference on Logic and the foundations of game and decision theory
A security enhancement and proof for authentication and key agreement (AKA)
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A formal approach to designing secure software architectures
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Automated refinement of security protocols
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Static checking of dynamically-varying security policies in database-backed applications
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Reachability as derivability, finite countermodels and verification
ATVA'10 Proceedings of the 8th international conference on Automated technology for verification and analysis
Secrecy and authenticity types for secure distributed messaging
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A new method for formalizing optimistic fair exchange protocols
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A correlation based detection system for keys reuse in SSH/SSL
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
Towards formal analysis of wireless LAN security with MIS protocol
International Journal of Ad Hoc and Ubiquitous Computing
L-PEP: a logic to reason about privacy-enhancing cryptography protocols
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Performance analysis and verification of safety communication protocol in train control system
Computer Standards & Interfaces
Formal analysis of device authentication applications in ubiquitous computing
Proceedings of the 2011 ACM Symposium on Applied Computing
Trust-based security level evaluation using Bayesian belief networks
Transactions on computational science X
A novel approach for protection of confidential web contents
ECC'11 Proceedings of the 5th European conference on European computing conference
MOMMIE knows best: systematic optimizations for verifiable distributed algorithms
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Transactions on Data Privacy
Enforcing S&D pattern design in RCES with modeling and formal approaches
Proceedings of the 14th international conference on Model driven engineering languages and systems
Long-term confidentiality of PKI
Communications of the ACM
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Computational soundness about formal encryption in the presence of secret shares and key cycles
ICICS'11 Proceedings of the 13th international conference on Information and communications security
${\mathcal PS}$-LTL for constraint-based security protocol analysis
ICLP'05 Proceedings of the 21st international conference on Logic Programming
A protocol's life after attacks...
Proceedings of the 11th international conference on Security Protocols
Proceedings of the 11th international conference on Security Protocols
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Cryptographically-Masked flows
SAS'06 Proceedings of the 13th international conference on Static Analysis
Secure rejoining scheme for dynamic sensor networks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Authentication mechanism using one-time password for 802.11 wireless LAN
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Application of formal methods for analysis of authentication protocols
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A fibred belief logic for multi-agent systems
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Analyzing security protocols using association rule mining
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
SVO logic based formalisms of GSI protocols
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A temporalised belief logic for specifying the dynamics of trust for multi-agent systems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Investigating authentication mechanisms for wireless mobile network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
End-to-end integrated security and performance analysis on the DEGAS choreographer platform
FM'05 Proceedings of the 2005 international conference on Formal Methods
A security model for home networks with authority delegation
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Modeling for security verification of a cryptographic protocol with MAC payload
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
For-LySa: UML for authentication analysis
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
An efficient and secure multi-server authentication scheme with key agreement
Journal of Systems and Software
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
iTrust'05 Proceedings of the Third international conference on Trust Management
CLIMA'04 Proceedings of the 5th international conference on Computational Logic in Multi-Agent Systems
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Abstractions preserving parameter confidentiality
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Epistemic temporal logic for information flow security
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
Formal verification of application-specific security properties in a model-driven approach
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
An abstract model of a trusted platform
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Model driven security analysis of IDaaS protocols
ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
Formal privacy analysis of communication protocols for identity management
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A novel common control channel security framework for cognitive radio networks
International Journal of Autonomous and Adaptive Communications Systems
On the security of an novel protocol for downloadable CAS
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
A task ordering approach for automatic trust establishment
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
ASLan++ -- a formal security specification language for distributed systems
FMCO'10 Proceedings of the 9th international conference on Formal Methods for Components and Objects
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
International Journal of Network Management
Evaluation technique in the spicalculus for cryptographic protocols
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Security and Communication Networks
Tutorial: Security in computer networks and distributed systems
Computer Communications
Research: Formal language for security services base modelling and analysis
Computer Communications
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Review: Artificial intelligence approaches to network management: recent advances and a survey
Computer Communications
A formal apparatus for modeling trust in computing environments
Mathematical and Computer Modelling: An International Journal
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Anonymous channel and authentication in wireless communications
Computer Communications
Relational-based calculus for trust management in networked services
Computer Communications
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Calculus of cooperation and game-based reasoning about protocol privacy
ACM Transactions on Computational Logic (TOCL)
Verification of security protocols using LOTOS-method and application
Computer Communications
Security policy conceptual modeling and formalization for networked information systems
Computer Communications
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Automatic verification of epistemic specifications under convergent equational theories
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Analysis of the SYM2 smart meter remote software download using formal methods reasoning
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
A robust e-commerce service: Light-weight secure mail-order mechanism
Electronic Commerce Research and Applications
LDYIS: a Framework for Model Checking Security Protocols
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Verification of the TESLA protocol in MCMAS-X
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A belief logic for analyzing security of web protocols
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Managing trust and secrecy in identity management clouds
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Secure communication in IPTV broadcasting
The Journal of Supercomputing
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Efficient proving for practical distributed access-control systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Journal of Computer and System Sciences
Using automated model analysis for reasoning about security of web protocols
Proceedings of the 28th Annual Computer Security Applications Conference
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Wireless Personal Communications: An International Journal
An innovative electronic group-buying system for mobile commerce
Electronic Commerce Research and Applications
HOTA: Handover optimized ticket-based authentication in network-based mobility management
Information Sciences: an International Journal
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Computational soundness of coinductive symbolic security under active attacks
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Secure communication mechanism for ubiquitous Smart grid infrastructure
The Journal of Supercomputing
A wide-adapted bantam protocol for roaming across wireless areas
Wireless Networks
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
Wireless Personal Communications: An International Journal
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing
A new hierarchical and scalable group key exchange protocol with XOR operation
International Journal of Wireless and Mobile Computing
The Journal of Supercomputing
Journal of Medical Systems
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Robust Smart Card Authentication Scheme for Multi-server Architecture
Wireless Personal Communications: An International Journal
Fast automatic security protocol generation
Journal of Computer Security
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.04 |
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.