A framework for compositional verification of security protocols
From MaRDI portal
Publication:2482454
DOI10.1016/j.ic.2007.07.002zbMath1147.68389OpenAlexW2125226998MaRDI QIDQ2482454
Sjouke Mauw, Stig F. Mjølsnes, Kristian Gjøsteen, Suzana Andova, C. J. F. Cremers, Saša Radomirović
Publication date: 16 April 2008
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://discovery.dundee.ac.uk/en/publications/4a00d192-5144-4614-bd2e-f486f77b7655
compositionalityconfidentialitysemanticsauthenticationautomatic verificationsecurity protocolssecurity propertieswimax
Related Items (8)
Model Checking Security Protocols ⋮ The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ Modular verification of protocol equivalence in the presence of randomness ⋮ Stateful protocol composition ⋮ Composition of password-based protocols ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ Cryptographic Protocol Composition via the Authentication Tests ⋮ Safely composing security protocols
Uses Software
Cites Work
- Operational semantics and verification of security protocols.
- Compositional analysis of contract-signing protocols
- Injective synchronisation: An extension of the authentication hierarchy
- A calculus for cryptographic protocols: The spi calculus
- Authentication tests and the structure of bundles.
- Protocol Composition Logic (PCL)
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- A logic of authentication
- Programming Languages and Systems
- Computer Aided Verification
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A framework for compositional verification of security protocols