Operational semantics and verification of security protocols.
DOI10.1007/978-3-540-78636-8zbMATH Open1267.68002OpenAlexW647742179MaRDI QIDQ610283FDOQ610283
Authors: Sjouke Mauw, C. J. F. Cremers
Publication date: 8 December 2010
Published in: Information Security and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78636-8
Recommendations
- Comparative analysis of formal model checking tools for security protocol verification
- Formal verification: an imperative step in the design of security protocols
- Security protocol verification: symbolic and computational models
- Models and Proofs of Protocol Security: A Progress Report
- A coordination-based methodology for security protocol verification
Data encryption (aspects in computer science) (68P25) Data structures (68P05) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Network protocols (68M12) Theory of data (68P99)
Cited In (24)
- Update semantics of security protocols
- Using probabilistic automata for security protocols verification
- Title not available (Why is that?)
- Title not available (Why is that?)
- Formal verification: an imperative step in the design of security protocols
- Constructing Security Protocol Specifications for Web Services
- A formal semantics for protocol narrations
- Comparative analysis of formal model checking tools for security protocol verification
- Injective synchronisation: An extension of the authentication hierarchy
- Handbook of Formal Analysis and Verification in Cryptography
- Log your car: reliable maintenance services record
- A coordination-based methodology for security protocol verification
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- Alice and Bob: reconciling formal models and implementation
- Title not available (Why is that?)
- A Survey of Practical Formal Methods for Security
- The vacuity of the open source security testing methodology manual
- Formal Methods for Assuring Security of Protocols
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA
- A framework for compositional verification of security protocols
- Simulation of security protocols based on scenarios of attacks
- Web security: Authentication protocols and their analysis
- ZB 2005: Formal Specification and Development in Z and B
- Cryptographic protocol. Security analysis based on trusted freshness.
Uses Software
This page was built for publication: Operational semantics and verification of security protocols.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q610283)