We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equivalent to a Dolev-Yao intruder that does not delay indefinitely the delivery of messages. In order to prove the equivalence, we formalize the resilient communication channels assumption. As an application of the proposed intruder model, formal verification of fair exchange protocols is discussed
Abstract. In formal methods, security protocols are usually modeled at a high level of abstraction. ...
Motivated by Murray’s work on the limits of refinement testing for CSP, we propose the use of ProB t...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
We present a process algebraic intruder model for verifying a class of liveness properties of securi...
We formally describe an intruder that is suitable for checking fairness properties of security proto...
We formally describe an intruder that is suitable for checking fairness properties of security proto...
In this paper, we provide the first methodology for reasoning about liveness properties of cryptogra...
Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that ...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
Most model checking techniques for security protocols make a number of simplifying assumptions on th...
We design and model-check a simple optimistic fair non-repudiation protocol. Our protocol is conside...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Abstract. In formal methods, security protocols are usually modeled at a high level of abstraction. ...
Motivated by Murray’s work on the limits of refinement testing for CSP, we propose the use of ProB t...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
We present a process algebraic intruder model for verifying a class of liveness properties of securi...
We formally describe an intruder that is suitable for checking fairness properties of security proto...
We formally describe an intruder that is suitable for checking fairness properties of security proto...
In this paper, we provide the first methodology for reasoning about liveness properties of cryptogra...
Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that ...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
Most model checking techniques for security protocols make a number of simplifying assumptions on th...
We design and model-check a simple optimistic fair non-repudiation protocol. Our protocol is conside...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Abstract. In formal methods, security protocols are usually modeled at a high level of abstraction. ...
Motivated by Murray’s work on the limits of refinement testing for CSP, we propose the use of ProB t...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...