doi:10.4156/jcit.vol5. issue10.19 This paper investigates model-checking Needham-Schroeder Public-Keyprotocol using Propositio nal Projection Temporal Logic (PPTL). To this end, the ProMeLa model of the protocol is firstly constructed then the properties to verify is specified by PPTL formulas, which is translated into automata and further to Never Claim. The transformation is by the method we present and is implemented by an automatic tool we developed. After that, the verification is done base on SPIN, and the results shows PPTL model checking approach is sound and can be used to verify more generalized communication protocols
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
peer reviewedWe present a tableau-based algorithm for obtaining an automaton from a temporal logic f...
In this paper we consider the problem of verifying time–sensitive security protocols, where temporal...
We show that the problem of model checking multi-dimensional modal logics can be reduced to the pr...
Abstract. This thesis is about the application of auto-mated reasoning techniques to the formal anal...
In this article a practical application of the Spin model checker for verifying cryptographic protoc...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
In this paper we face the problem of specifying and verifying security protocols where temporal aspe...
We use standard linear-time temporal logic to specify cryptographic protocols, model the system pene...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
International audienceThis paper proposes an enhanced translation of Security Protocol Language (SPL...
In this paper we consider the problem of verifying time–sensitive security protocols, where temporal...
We present a model checking framework for a spi-calculus dialect which uses a linear time temporal l...
It is important to reason about a number of desirable protocol properties to ensure correctness of a...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
peer reviewedWe present a tableau-based algorithm for obtaining an automaton from a temporal logic f...
In this paper we consider the problem of verifying time–sensitive security protocols, where temporal...
We show that the problem of model checking multi-dimensional modal logics can be reduced to the pr...
Abstract. This thesis is about the application of auto-mated reasoning techniques to the formal anal...
In this article a practical application of the Spin model checker for verifying cryptographic protoc...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
In this paper we face the problem of specifying and verifying security protocols where temporal aspe...
We use standard linear-time temporal logic to specify cryptographic protocols, model the system pene...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
International audienceThis paper proposes an enhanced translation of Security Protocol Language (SPL...
In this paper we consider the problem of verifying time–sensitive security protocols, where temporal...
We present a model checking framework for a spi-calculus dialect which uses a linear time temporal l...
It is important to reason about a number of desirable protocol properties to ensure correctness of a...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
peer reviewedWe present a tableau-based algorithm for obtaining an automaton from a temporal logic f...
In this paper we consider the problem of verifying time–sensitive security protocols, where temporal...