Analyzing security protocols with secrecy types and logic programs
From MaRDI portal
Publication:3546279
DOI10.1145/1044731.1044735zbMath1204.68030MaRDI QIDQ3546279
Publication date: 21 December 2008
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1044731.1044735
94A60: Cryptography
68Q55: Semantics in the theory of computing
68Q60: Specification and verification (program logics, model checking, etc.)
68M12: Network protocols
Related Items
Computing strong and weak bisimulations for psi-calculi, Contracts for security adaptation, Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types, Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography, Automated verification of selected equivalences for security protocols, On the relationships between models in protocol verification, Breaking and fixing public-key Kerberos, Cryptographic Verification by Typing for a Sample Protocol Implementation, Formal Analysis of Dynamic, Distributed File-System Access Controls