Protocol composition logic (PCL)
From MaRDI portal
Publication:2864155
DOI10.1016/J.ENTCS.2007.02.012zbMATH Open1277.68033OpenAlexW2168277905MaRDI QIDQ2864155FDOQ2864155
Authors: Anupam Datta, Ante Derek, John Mitchell, Arnab Roy
Publication date: 6 December 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.012
Recommendations
Cites Work
- Computer Aided Verification
- The NRL Protocol Analyzer: An Overview
- Probabilistic logic
- Title not available (Why is that?)
- Title not available (Why is that?)
- The chemical abstract machine
- A calculus for cryptographic protocols: The spi calculus
- Secure protocol composition
- Mobile values, new names, and secure communication
- An axiomatic basis for computer programming
- Communicating sequential processes
- Using encryption for authentication in large networks of computers
- On the Asynchronous Nature of the Asynchronous π-Calculus
- Protocols for authentification and key establishment
- Title not available (Why is that?)
- Proofs of Networks of Processes
- On the security of public key protocols
- Breaking and fixing public-key Kerberos
- Formal analysis of Kerberos 5
- Foundations of Software Science and Computation Structures
- Automata, Languages and Programming
- Title not available (Why is that?)
- Compositional analysis of contract-signing protocols
- Title not available (Why is that?)
Cited In (12)
- Distributed temporal logic for the analysis of security protocol models
- Constructing Security Protocol Specifications for Web Services
- Categorical composable cryptography: extended version
- Categorical composable cryptography
- Compositional system security with interface-confined adversaries
- Bayesian authentication: quantifying security of the Hancke-Kuhn protocol
- CIL security proof for a password-based key exchange
- Safely Composing Security Protocols
- A framework for compositional verification of security protocols
- Study of protocol composition logic
- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols
- A survey of symbolic methods in computational analysis of cryptographic systems
Uses Software
This page was built for publication: Protocol composition logic (PCL)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2864155)