Towards an Automatic Analysis of Security Protocols in First-Order Logic

نویسنده

  • Christoph Weidenbach
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On-the-fly Model Checking of Security Protocols

Due to extreme importance of security protocols in the modern world, to ensure security protocols to be more reliable, and to speed up the development of new protocols, it is important to have tools that support the activity of finding flaws in protocols, or guaranteeing correctness of protocols. Various formalisms for the specification of security protocols have been proposed based on, e.g. pr...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

The Effectiveness of the Automatic System of Fuzzy Logic-Based Technical Patterns Recognition: Evidence from Tehran Stock Exchange

The present research proposes an automatic system based on moving average (MA) and fuzzy logic to recognize technical analysis patterns including head and shoulder patterns, triangle patterns and broadening patterns in the Tehran Stock Exchange. The automatic system was used on 38 indicators of Tehran Stock Exchange within the period 2014-2017 in order to evaluate the effectiveness of technical...

متن کامل

Design of Fuzzy Logic Based PI Controller for DFIG-based Wind Farm Aimed at Automatic Generation Control in an Interconnected Two Area Power System

This paper addresses the design procedure of a fuzzy logic-based adaptive approach for DFIGs to enhance automatic generation control (AGC) capabilities and provide better dynamic responses in multi-area power systems. In doing so, a proportional-integral (PI) controller is employed in DFIG structure to control the governor speed of wind turbine. At the first stage, the adjustable parameters of ...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999