Protocol composition logic (PCL)

A Datta, A Derek, JC Mitchell, A Roy - Electronic Notes in Theoretical …, 2007 - Elsevier
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …

A modular correctness proof of IEEE 802.11 i and TLS

C He, M Sundararajan, A Datta, A Derek… - Proceedings of the 12th …, 2005 - dl.acm.org
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …

A derivation system and compositional logic for security protocols

A Datta, A Derek, JC Mitchell… - Journal of Computer …, 2005 - content.iospress.com
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …

Methods and apparatuses for user-verifiable trusted path in the presence of malware

JM McCune, AM Perrig, A Datta, VD Gligor… - US Patent …, 2014 - Google Patents
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …

Probabilistic polynomial-time semantics for a protocol security logic

A Datta, A Derek, JC Mitchell, V Shmatikov… - … Colloquium on Automata …, 2005 - Springer
We describe a cryptographically sound formal logic for proving protocol security properties
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …

Secure protocol composition

A Datta, A Derek, JC Mitchell, D Pavlovic - … of the 2003 ACM workshop on …, 2003 - dl.acm.org
Modular composition of security mechanisms is complicated by the way that one mechanism
may reveal information that interferes with the security of another. We develop methods for …

[图书][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

Computationally sound compositional logic for key exchange protocols

A Datta, A Derek, JC Mitchell… - 19th IEEE Computer …, 2006 - ieeexplore.ieee.org
We develop a compositional method for proving cryptographically sound security properties
of key exchange protocols, based on a symbolic logic that is interpreted over conventional …

Trust management in strand spaces: A rely-guarantee method

JD Guttman, FJ Thayer, JA Carlson, JC Herzog… - European Symposium …, 2004 - Springer
We show how to combine trust management theories with nonce-based cryptographic
protocols. The strand space framework for protocol analysis is extended by associating …