Burrows–Abadi–Needham logic

Results: 22



#Item
1Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Protocol / Data / Information / Cryptographic protocols

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-02-18 06:01:24
2Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:05:15
3Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-12-15 20:24:55
4Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
5Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2008-05-19 14:54:15
6Modal logic / Logic in computer science / Non-classical logic / Philosophical logic / Artificial intelligence / Epistemic modal logic / Burrows–Abadi–Needham logic / Temporal logic / Dynamic logic / Logic / Mathematical logic / Mathematics

Dynamic Logic for Security (DYLOS) Abstract The research proposed in this document focuses on the application of dynamic logic in the analysis and design of security protocols. We adopt the intentional approach of multi

Add to Reading List

Source URL: www.cs.rug.nl

Language: English - Date: 2009-02-27 08:29:43
7Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
8Philosophical logic / Model theory / Burrows–Abadi–Needham logic / Modal logic / Protocol composition logic / Communications protocol / Public-key cryptography / First-order logic / Actor model / Logic / Cryptography / Mathematical logic

A Timed Logic for Modeling and Reasoning about Security Protocols★ Xinfeng Lei1 Rui Xue1 and Ting Yu2 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 21:08:46
9Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
10Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
UPDATE