Distributed temporal logic for the analysis of security protocol models
From MaRDI portal
Publication:549724
DOI10.1016/j.tcs.2011.04.006zbMath1253.68053OpenAlexW2024006228MaRDI QIDQ549724
Carlos Caleiro, Jaime Ramos, Luca Viganò, David A. Basin
Publication date: 18 July 2011
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.04.006
temporal logicsecurity protocolsdistributed temporal logicsecurity protocol analysissecurity protocol models
Related Items (2)
A branching distributed temporal logic for reasoning about entanglement-free quantum state transformations ⋮ Probability timed automata for investigating communication processes
Uses Software
Cites Work
- On the semantics of Alice \& Bob specifications of security protocols
- A (restricted) quantifier elimination for security protocols
- Safely composing security protocols
- Authentication tests and the structure of bundles.
- Secure implementation of channel abstractions
- Protocols for authentification and key establishment
- Specifying communication in distributed information systems
- The reactive simulatability (RSIM) framework for asynchronous systems
- A framework for compositional verification of security protocols
- Protocol Composition Logic (PCL)
- The NRL Protocol Analyzer: An Overview
- Secure Pseudonymous Channels
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- The CL-Atse Protocol Analyser
- Cryptographic Protocol Composition via the Authentication Tests
- Labelled Tableaux for Distributed Temporal Logic
- On the security of public key protocols
- TEMPORAL LOGICS FOR COMMUNICATING SEQUENTIAL AGENTS: I
- Using encryption for authentication in large networks of computers
- Computer Aided Verification
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Distributed temporal logic for the analysis of security protocol models