Anonymity is not a trace-based property, therefore traditional model checkers are not directly able to express it and verify it. However, by using epistemic logic (logic of knowledge) to model the protocols, anonymity becomes an easily verifiable epistemic formula. We propose using Dynamic Epistemic Logic to model security protocols and properties, in particular anonymity properties. We have built tool support for DEL verification which reuses state-of-the-art tool support for automata-based verification. We illustrate this approach by analyzing an anonymous broadcast protocol and an electronic voting protocol. By comparison with a process-based analysis of the same protocols, we also discuss the relative (dis)advantages of the process-base...
Abstract. Security protocols play more and more important role with widely use in many applications ...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
AbstractAnonymity is not a trace-based property, therefore traditional model checkers are not direct...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Formal methods have provided us with tools to check both anonymity of protocols and - more specifica...
Abstract. Security protocols play more and more important role with widely use in many applications ...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
AbstractAnonymity is not a trace-based property, therefore traditional model checkers are not direct...
Anonymity is not a trace-based property, therefore traditional model checkers are not directly able ...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
We propose a dynamic epistemic framework for the verification of security protocols. First, we intro...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Formal methods have provided us with tools to check both anonymity of protocols and - more specifica...
Abstract. Security protocols play more and more important role with widely use in many applications ...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
This dissertation presents a logical investigation of epistemic protocols, focussing on protocol-dyn...