Burrows–Abadi–Needham logic

Results: 22



#Item
1Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-02-18 06:01:24
2A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:05:15
3Journal of Computer Security–721 IOS Press 677  A compositional logic for proving security properties of

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-12-15 20:24:55
4Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
5Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2008-05-19 14:54:15
6Dynamic Logic for Security (DYLOS)  Abstract The research proposed in this document focuses on the application of dynamic logic in the analysis and design of security protocols. We adopt the intentional approach of multi

Dynamic Logic for Security (DYLOS) Abstract The research proposed in this document focuses on the application of dynamic logic in the analysis and design of security protocols. We adopt the intentional approach of multi

Add to Reading List

Source URL: www.cs.rug.nl

Language: English - Date: 2009-02-27 08:29:43
7Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
8A Timed Logic for Modeling and Reasoning about Security Protocols★ Xinfeng Lei1 Rui Xue1 and Ting Yu2 2

A Timed Logic for Modeling and Reasoning about Security Protocols★ Xinfeng Lei1 Rui Xue1 and Ting Yu2 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 21:08:46
9A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
10NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specication in Formal Cryptographic Protocol Analysis Catherine Meadows

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05