Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The thesis describes how epistemic model checking technology may be applied to discover and verify concrete implementations based on this abstract level of description. The details of the implementations depend on the specific context of use of the protocol. The knowledge-based approach enables the implementations to be optimized relative to these conditions of use. The approach is illustrated using extensions of the Dining Cryptographers protocol, a security protocol for anonymous broadcast.This thesis also provides a comprehensive introduction to epistemic logic model checking and its application ...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
htmlabstractWe present a variant of Kripke models to model knowledge of large numbers, applicable t...
This paper describes how symbolic techniques (in particular, OBDD’s) may be used to to implement an ...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
We are interested in applying model checking techniques to the verification of communication protoc...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. We present a variant of Kripke models to model knowledge of large numbers, applicable to c...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
This paper describes an algorithm for model checking a fragment of the logic of knowledge and probab...
The formal verifiation of security properties of a cryptographic protocol is a diffcult, albeit very...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
htmlabstractWe present a variant of Kripke models to model knowledge of large numbers, applicable t...
This paper describes how symbolic techniques (in particular, OBDD’s) may be used to to implement an ...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
We are interested in applying model checking techniques to the verification of communication protoc...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. We present a variant of Kripke models to model knowledge of large numbers, applicable to c...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
This paper describes an algorithm for model checking a fragment of the logic of knowledge and probab...
The formal verifiation of security properties of a cryptographic protocol is a diffcult, albeit very...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
htmlabstractWe present a variant of Kripke models to model knowledge of large numbers, applicable t...