Linear epistemic logic can be used to reason about changing knowledge states of agents acting in a system. Here we use it to formalize the Needham-Schröder-Lowe public-key authentication protocol for establishing secure communication sessions. We have developed a notion of adequacy to refer to the formal compositional corre-spondence between the protocol and the formalism. Through the iterative process of attempting to prove adequacy theorems and noting where and how the proof breaks down, we have been able to refine the formalism so that it adheres to the structure and semantics of the protocol as it was originally specified. This work is the first step towards showing that rigorous formal reasoning can be applied to protocols and process...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
In this paper, we make the point that the problems with logics in the BAN tradition are not with the...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
An understanding of cryptographic protocols requires that we examine the knowledge of protocol parti...
An understanding of cryptographic protocols requires that we examine the knowledge of protocol parti...
It is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, ...
It is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, ...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
In this paper, we make the point that the problems with logics in the BAN tradition are not with the...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
An understanding of cryptographic protocols requires that we examine the knowledge of protocol parti...
An understanding of cryptographic protocols requires that we examine the knowledge of protocol parti...
It is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, ...
It is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, ...
Questions of belief are essential in analyzing protocols for the authentication of principals in dis...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...