We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the validation of each component in isolation is provably sound and fully compositional: if all the protocol participants are independently validated, then the protocol as a whole guarantees authentication in the presence of Dolev-Yao intruders possibly sharing long term keys with honest principals. Protocol are thus validated in the presence of both malicious outsiders and compromised insiders. The highly compositional nature of the analysis makes it suitable for multi-protocol systems, where different protocols might be executed concurrently.
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Authentication protocols are very simple distributed algorithms whose purpose is to enable two entit...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
We propose a type and effect system for authentication protocols built upon a tagging scheme that f...
We propose a type and effect system for authentication protocols built upon a tagging scheme that fo...
This paper contrasts two existing type-based techniques for the analysis of authentication protocols...
AbstractFormal methods have been proved successful in analyzing different kinds of security protocol...
Abstract. We propose a new method for the static analysis of entity authentication protocols. We dev...
Formal methods have been proved successful in analyzing different kinds of security protocols. They ...
International audienceType systems are effective tools for verifying the security of cryptographic p...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
We introduce a family of multi-party authentication protocols and discuss six novel protocols, which...
In practice, users will rely on a wide variety of communication protocols to conduct their work over...
The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact ...
Designing authentication protocols is an error-prone process. In this paper, we develop a deductive ...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Authentication protocols are very simple distributed algorithms whose purpose is to enable two entit...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...
We propose a type and effect system for authentication protocols built upon a tagging scheme that f...
We propose a type and effect system for authentication protocols built upon a tagging scheme that fo...
This paper contrasts two existing type-based techniques for the analysis of authentication protocols...
AbstractFormal methods have been proved successful in analyzing different kinds of security protocol...
Abstract. We propose a new method for the static analysis of entity authentication protocols. We dev...
Formal methods have been proved successful in analyzing different kinds of security protocols. They ...
International audienceType systems are effective tools for verifying the security of cryptographic p...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
We introduce a family of multi-party authentication protocols and discuss six novel protocols, which...
In practice, users will rely on a wide variety of communication protocols to conduct their work over...
The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact ...
Designing authentication protocols is an error-prone process. In this paper, we develop a deductive ...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Authentication protocols are very simple distributed algorithms whose purpose is to enable two entit...
Running critical applications, such as e-commerce, in a distributed environment requires assurance o...