A (restricted) quantifier elimination for security protocols
DOI10.1016/J.TCS.2006.08.037zbMATH Open1153.94008OpenAlexW2126994166WikidataQ115036551 ScholiaQ115036551MaRDI QIDQ860909FDOQ860909
Authors: N. E. Zubov
Publication date: 9 January 2007
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2006.08.037
Recommendations
- Bounding messages for free in security protocols -- extension to various security properties
- Dynamic tags for security protocols
- A quantifier-free first-order knowledge logic of authentication
- From One Session to Many: Dynamic Tags for Security Protocols
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables
Specification and verification (program logics, model checking, etc.) (68Q60) Decidability of theories and sets of sentences (03B25) Authentication, digital signatures and secret sharing (94A62) Quantifier elimination, model completeness, and related topics (03C10)
Cites Work
- Title not available (Why is that?)
- Secure protocol composition
- Computer science today. Recent trends and developments
- Using encryption for authentication in large networks of computers
- Title not available (Why is that?)
- Title not available (Why is that?)
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- On the security of public key protocols
- Authentication tests and the structure of bundles.
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- A new logic for electronic commerce protocols
- Information based reasoning about security protocols
- A semantics for a logic of authentication (extended abstract)
- Authentication and delegation with smart-cards
Cited In (5)
- Distributed temporal logic for the analysis of security protocol models
- Bounding Messages for Free in Security Protocols
- From One Session to Many: Dynamic Tags for Security Protocols
- Dynamic tags for security protocols
- Bounding messages for free in security protocols -- extension to various security properties
This page was built for publication: A (restricted) quantifier elimination for security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q860909)