Modal tableaux for verifying stream authentication protocols
نویسندگان
چکیده
منابع مشابه
Modal tableaux for verifying security protocols
To develop theories to specify and reason about various aspects of multi-agent systems, many researchers have proposed the use of modal logics such as belief logics, logics of knowledge, and logics of norms. As multi-agent systems operate in dynamic environments, there is also a need to model the evolution of multi-agent systems through time. In order to introduce a temporal dimension to a beli...
متن کاملVerifying Authentication Protocols in CSP
This paper presents a general approach for analysis and verification of authentication properties using the theory of Communicating Sequential Processes (CSP). The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and...
متن کاملVerifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes CSP It is il lustrated by an examination of the Needham Schroeder public key protocol The contribution of this paper is to develop a speci c theory appropriate to the analy sis of authentication protocols built on top of the gen eral CSP semantic...
متن کاملVerifying authentication protocols: methodology and example
We present a new approach to the analysis of authenti-cation protocols. The approach consists of several elements: a speciication language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper...
متن کاملVerifying Group Authentication Protocols by Scyther
Scyther [1] is a tool designed to formally analyze security protocols, their security requirements and potential vulnerabilities. It is designed under the perfect or unbreakable encryption assumption [2], which means that an adversary learns nothing from an encrypted message unless he knows the decryption key. To our best knowledge, most protocols analyzed using Scyther are widely used standard...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Autonomous Agents and Multi-Agent Systems
سال: 2008
ISSN: 1387-2532,1573-7454
DOI: 10.1007/s10458-007-9027-4