Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the agents. Since BAN-logic, there have been several initiatives and attempts to incorporate epistemics into the analysis of security protocols. In this paper, we give an overview of work in the field and present it in a unified perspective, with comparisons on technical subtleties that have been employed in different approaches. Also, we study to which degree the use of epistemics is essential for the analysis of security protocols. We look for formal conditions under which knowledge modalities can bring extra expressive power to pure temporal languages. On the other hand, we discuss the cost of the epistemic operators in terms of model checkin...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
htmlabstractOperational models of protocols, on one hand, are readable and conveniently match their ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
In this paper, we make the point that the problems with logics in the BAN tradition are not with the...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
We propose a unifying framework for formal specification and verification of both epistemic and beha...
We propose a unifying framework for formal specification and verification of both epistemic and beha...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
htmlabstractOperational models of protocols, on one hand, are readable and conveniently match their ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
In this paper, we make the point that the problems with logics in the BAN tradition are not with the...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
We propose a unifying framework for formal specification and verification of both epistemic and beha...
We propose a unifying framework for formal specification and verification of both epistemic and beha...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
Operational models of protocols, on one hand, are readable and conveniently match their implementati...
htmlabstractOperational models of protocols, on one hand, are readable and conveniently match their ...