Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Distance bounding protocols: Authentication logic analysis and collusion attacks

C Meadows, R Poovendran, D Pavlovic… - Secure localization and …, 2007 - Springer
In this paper we consider the problem of securely measuring distance between two nodes in
a wireless sensor network. The problem of measuring distance has fundamental …

[图书][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

Formal analysis of Kerberos 5

F Butler, I Cervesato, AD Jaggard, A Scedrov… - Theoretical Computer …, 2006 - Elsevier
We report on the detailed verification of a substantial portion of the Kerberos 5 protocol
specification. Because it targeted a deployed protocol rather than an academic abstraction …

Cryptographically sound security proofs for basic and public-key kerberos

M Backes, I Cervesato, AD Jaggard, A Scedrov… - … –ESORICS 2006: 11th …, 2006 - Springer
We present a computational analysis of basic Kerberos and Kerberos with public-key
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …

Towards provable secure neighbor discovery in wireless networks

M Poturalski, P Papadimitratos, JP Hubaux - Proceedings of the 6th …, 2008 - dl.acm.org
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining
which devices are within direct radio communication is an enabler for networking protocols …

Refining security protocols

C Sprenger, D Basin - Journal of Computer Security, 2018 - content.iospress.com
We propose a development method for security protocols based on stepwise refinement.
Our refinement strategy transforms abstract security goals into protocols that are secure …

Developing security protocols by refinement

C Sprenger, D Basin - Proceedings of the 17th ACM conference on …, 2010 - dl.acm.org
We propose a development method for security protocols based on stepwise refinement.
Our refinement strategy guides the transformation of abstract security goals into protocols …

Refining key establishment

C Sprenger, D Basin - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
We use refinement to systematically develop a family of key establishment protocols using a
theorem prover. Our development spans four levels of abstraction: abstract security …

Deriving secrecy in key establishment protocols

D Pavlovic, C Meadows - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Secrecy and authenticity properties of protocols are mutually dependent: every
authentication is based on some secrets, and every secret must be authenticated. This …