Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Protocol composition logic (PCL)

A Datta, A Derek, JC Mitchell, A Roy - Electronic Notes in Theoretical …, 2007 - Elsevier
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …

Analyzing security protocols with secrecy types and logic programs

M Abadi, B Blanchet - Journal of the ACM (JACM), 2005 - dl.acm.org
We study and further develop two language-based techniques for analyzing security
protocols. One is based on a typed process calculus; the other, on untyped logic programs …

A modular correctness proof of IEEE 802.11 i and TLS

C He, M Sundararajan, A Datta, A Derek… - Proceedings of the 12th …, 2005 - dl.acm.org
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …

Types and effects for asymmetric cryptographic protocols

AD Gordon, A Jeffrey - Journal of Computer Security, 2004 - content.iospress.com
We present the first type and effect system for proving authenticity properties of security
protocols based on asymmetric cryptography. The most significant new features of our type …

A derivation system and compositional logic for security protocols

A Datta, A Derek, JC Mitchell… - Journal of Computer …, 2005 - content.iospress.com
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …

Methods and apparatuses for user-verifiable trusted path in the presence of malware

JM McCune, AM Perrig, A Datta, VD Gligor… - US Patent …, 2014 - Google Patents
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …

A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols

JC Mitchell, A Ramanathan, A Scedrov… - Theoretical Computer …, 2006 - Elsevier
We prove properties of a process calculus that is designed for analysing security protocols.
Our long-term goal is to develop a form of protocol analysis, consistent with standard …