AbstractWe propose a notion of information based abstraction for the logical study of security protocols and study how protocol actions update agents' information. We show that interesting security properties of Needham-Schroeder like protocols can be verified automatically
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
This paper presents a new method for specifying and analyzing cryptographic protocols. Our method of...
This paper describes a new interactive method to analyse knowledge of participants involved in secur...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe report on work-in-progress on a new semantics for analyzing security protocols that combi...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
This paper presents a new method for specifying and analyzing cryptographic protocols. Our method of...
This paper describes a new interactive method to analyse knowledge of participants involved in secur...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe report on work-in-progress on a new semantics for analyzing security protocols that combi...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an age...
This paper presents a new method for specifying and analyzing cryptographic protocols. Our method of...
This paper describes a new interactive method to analyse knowledge of participants involved in secur...