In this paper we show how model checking can be used for the verification of security protocols using a logic of belief. We model principals as processes able to have beliefs. The idea underlying the approach is to treat separately the temporal evolution and the belief aspects of principals. Therefore, when we consider the temporal evolution, belief formulate are treated as atomic propositions; while the fact that principal A has beliefs about another principal B si modeled as the fact that A has access to a representation of B as a process. As motivating example, we use the framework proposed to formalize the Andrew protoco
Abstract. This thesis is about the application of automated reasoning techniques to the formal analy...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
Model checking is a very successful technique which has been applied in the design and verification ...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
When designing a cryptographic protocol or explaining it, one often uses arguments such as "since th...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. This thesis is about the application of automated reasoning techniques to the formal analy...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...
Model checking is a very successful technique which has been applied in the design and verification ...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Cryptographic protocols are structured sequences of mes-sages that are used for exchanging informati...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
When designing a cryptographic protocol or explaining it, one often uses arguments such as "since th...
The goal of an authentication system is to verify and authorise users, in order to protect restricte...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. This thesis is about the application of automated reasoning techniques to the formal analy...
AbstractTemporal logics of knowledge are useful for reasoning about situations where the knowledge o...
Abstract. Model checking as an approach to the automatic verification of finite state systems has fo...