Proving mutual authentication property of RCIA protocol in RFID based on logic of events

X Zhong, M Xiao, T Zhang, K Yang… - Chinese Journal of …, 2022 - Wiley Online Library
The increasing commercialization and massive deployment of radio frequency identification
(RFID) systems has raised many security related issues which in return evokes the need of …

A nominal exploration of intuitionism

V Rahli, M Bickford - Proceedings of the 5th ACM SIGPLAN Conference …, 2016 - dl.acm.org
This papers extends the Nuprl proof assistant (a system representative of the class of
extensional type theories a la Martin-Lof) with named exceptions and handlers, as well as a …

Formal analysis of signal protocol based on logic of events theory

Z Li, M Xiao, R Xu - Scientific Reports, 2024 - nature.com
The Signal is an end-to-end encrypted communication protocol composed of a double
ratchet (DR) protocol and an extended triple Diffie-Hellman (X3DH) protocol. Its complex …

Validating Brouwer's continuity principle for numbers using named exceptions

V Rahli, M Bickford - Mathematical Structures in Computer Science, 2018 - cambridge.org
This paper extends the Nuprl proof assistant (a system representative of the class of
extensional type theories with dependent types) with named exceptions and handlers, as …

A novel approach to automatic security protocol analysis based on authentication event logic

M Xiao, C Ma, C Deng, K Zhu - Chinese Journal of Electronics, 2015 - Wiley Online Library
Since security protocols form the cornerstones of modern secure networked systems, it is
important to develop informative, accurate, and deployable approach for finding errors and …

Proving authentication property of PUF-based mutual authentication protocol based on logic of events

J Song, M Xiao, T Zhang, H Zhou - Soft Computing, 2022 - Springer
PUF (Physical unclonable function) is a new hardware security primitive, and the research
on PUFs is one of the emerging research focuses. For PUF-based mutual authentication …

Logic of events for proving security properties of protocols

M Xiao, M Bickford - … on Web Information Systems and Mining, 2009 - ieeexplore.ieee.org
Formal methods are vital for ensuring the security and reliability of the network systems. We
propose a promising method to check security properties of cryptographic protocols using …

Bar induction: The good, the bad, and the ugly

V Rahli, M Bickford… - 2017 32nd Annual ACM …, 2017 - ieeexplore.ieee.org
We present an extension of the computation system and logic of the Nuprl proof assistant
with intuitionistic principles, namely versions of Brouwer's bar induction principle, which is …

Formal Logical Methods for System Security and Correctness 29 O. Grumberg et al.(Eds.) IOS Press, 2008© 2008 IOS Press. All rights reserved. Formal Foundations …

M Bickford, R Constable - Formal Logical Methods for System …, 2008 - books.google.com
We would like to know with very high confidence that private data in computers is not
unintentionally disclosed and that only authorized persons or processes can modify it …

[PDF][PDF] Automated Proof of Authentication Protocols in a Logic of Events.

M Bickford, RL Constable - VERIFY@ IJCAR, 2010 - Citeseer
Using the language of event orderings and event classes, and using a type of atoms to
represent nonces, keys, signatures, and ciphertexts, we give an axiomatization of a theory in …