ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Protocols for Secure Electronic Commerce
Protocols for Secure Electronic Commerce
Formal Verification of Cardholder Registration in SET
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Reasoning about accountability in protocols for electronic commerce
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Hi-index | 0.00 |
This paper proposes a new logic for verifying secure transaction protocols. We have named this logic the ENDL (extension of non-monotonic dynamic logic). In this logic, timestamps and signed certificates are used for protecting against replays of old keys or the substitution of bogus keys. The logic is useful for verifying the authentication properties of secure protocols, and especially for protecting data integrity. To evaluate the logic, three practical instances of secure protocols are illustrated. This evaluation demonstrates that the ENDL is effective and promising.