AbstractAt the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logic. In particular, encrypted data can be seen naturally as an abstract data-type. Entailments between security protocols as linear logic theories can be surprisingly strong. We also illustrate how the well-known connection in linear logic between bipolar formulas and general formulas can be used to show that the asynchronous model of communicat...
We have been developing a cryptographically sound formal logic for proving protocol security propert...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
AbstractAt the Dolev-Yao level of abstraction, security protocols can be specified using multisets r...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting...
AbstractThe language MSR has successfully been used in the past to prove undecidability results abou...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly refe...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly refe...
The theory of relational parametricity and its logical relations proof technique are powerful tools ...
AbstractIn this paper we investigate the applicability of a bottom-up evaluation strategy for a firs...
When using formal methods, security protocols are usually modeled at a high level of abstraction. In...
We present a revisited semantics for multiset rewriting founded on the left sequent rules of linear...
Abstract. We present a revisited semantics for multiset rewriting founded on the left sequent rules ...
When formalizing security protocols, dierent speci cation languages support very dierent reasoning...
Abstract. When formalizing security protocols, different specification languages support very differ...
We have been developing a cryptographically sound formal logic for proving protocol security propert...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
AbstractAt the Dolev-Yao level of abstraction, security protocols can be specified using multisets r...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting...
AbstractThe language MSR has successfully been used in the past to prove undecidability results abou...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly refe...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly refe...
The theory of relational parametricity and its logical relations proof technique are powerful tools ...
AbstractIn this paper we investigate the applicability of a bottom-up evaluation strategy for a firs...
When using formal methods, security protocols are usually modeled at a high level of abstraction. In...
We present a revisited semantics for multiset rewriting founded on the left sequent rules of linear...
Abstract. We present a revisited semantics for multiset rewriting founded on the left sequent rules ...
When formalizing security protocols, dierent speci cation languages support very dierent reasoning...
Abstract. When formalizing security protocols, different specification languages support very differ...
We have been developing a cryptographically sound formal logic for proving protocol security propert...
We study and further develop two language-based techniques for analyzing security protocols. One is ...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...