A game-theoretic framework for specification and verification of cryptographic protocols
From MaRDI portal
Publication:607405
DOI10.1007/S00165-009-0129-4zbMATH Open1211.68254OpenAlexW2012369158MaRDI QIDQ607405FDOQ607405
Authors: Mohamed Saleh, M. Debbabi
Publication date: 22 November 2010
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00165-009-0129-4
Recommendations
Applications of game theory (91A80) Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60)
Cites Work
- Alternating-time temporal logic
- On full abstraction for PCF: I, II and III
- A calculus for cryptographic protocols: The spi calculus
- Mobile values, new names, and secure communication
- Using encryption for authentication in large networks of computers
- A logic of authentication
- A game semantics for linear logic
- Automated verification of selected equivalences for security protocols
- Title not available (Why is that?)
- Deciding knowledge in security protocols under equational theories
- On the security of public key protocols
- Tableau-based model checking in the propositional mu-calculus
- Title not available (Why is that?)
- A new logic for electronic commerce protocols
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Basic objectives of dialogue logic in historical perspective
- Formal analysis of multiparty contract signing
- A method for symbolic analysis of security protocols
- Security protocols and their properties
- Title not available (Why is that?)
Cited In (6)
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- A Note on Game Theory and Verification
- The layered games framework for specifications and analysis of security protocols
- A Calculus for Game-Based Security Proofs
- Game-Theoretic Analysis of an Incentivized Verifiable Computation System
- Automated Game-Theoretic Verification of Security Systems
This page was built for publication: A game-theoretic framework for specification and verification of cryptographic protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q607405)