The NRL Protocol Analyzer: An Overview

From MaRDI portal
Publication:3128627


DOI10.1016/0743-1066(95)00095-XzbMath0871.68052MaRDI QIDQ3128627

Catherine A. Meadows

Publication date: 17 April 1997

Published in: The Journal of Logic Programming (Search for Journal in Brave)


68N17: Logic programming


Related Items

LTL model checking for security protocols, Automatic verification of temporal-epistemic properties of cryptographic protocols, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Automating Security Analysis: Symbolic Equivalence of Constraint Systems, Web security: Authentication protocols and their analysis, NRL, Relating state-based and process-based concurrency through linear logic (full-version), Complete symbolic reachability analysis using back-and-forth narrowing, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types, Finite-state analysis of two contract signing protocols, Analysis of security protocols as open systems, A new logic for electronic commerce protocols, Protocol insecurity with a finite number of sessions and composed keys is NP-complete., Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures, Rule-based static analysis of network protocol implementations, Hierarchical combination of intruder theories, Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically, Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols, Challenges in the Automated Verification of Security Protocols