A logic of authentication

From MaRDI portal
Publication:4206382

DOI10.1098/rspa.1989.0125zbMath0687.68007OpenAlexW2175661655WikidataQ56518199 ScholiaQ56518199MaRDI QIDQ4206382

No author found.

Publication date: 1989

Published in: Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1098/rspa.1989.0125




Related Items (65)

Gordon's computer: A hardware verification case study in OBJ3Source code verification of a secure payment appletHomomorphism key agreement based on RSAA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsReasoning About Trust and Belief Change on a Social Network: A Formal ApproachThree-factor-based confidentiality-preserving remote user authentication scheme in multi-server environmentOn the design of cryptographic primitivesStatic Evidences for Attack ReconstructionRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsRobust and efficient authentication scheme for session initiation protocolA game-theoretic framework for specification and verification of cryptographic protocolsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterThreat scenarios as a means to formally develop secure systemsModelling a public-key infrastructureOperational and Epistemic Approaches to Protocol Analysis: Bridging the GapReasoning about cryptographic protocols in the spi calculusTo know or not to know: Epistemic approaches to security protocol verificationTimed models of security protocols including delays in the networkStudy on strand space model theoryTableaux methods for access control in distributed systemsA semantics for web services authenticationAn improvement of GNY logic for the reflection attacksA new three-party-authenticated key agreement scheme based on chaotic maps without password tableAutomated type-based analysis of injective agreement in the presence of compromised principalsAn attack on the Needham-Schroeder public-key authentication protocolThe reactive simulatability (RSIM) framework for asynchronous systemsCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographyKey Compromise, Strand Spaces, and the Authentication Tests1 1I gave my MFPS 17 talk on 24 May 2001, Bob Dylan's sixtieth birthday. This paper is dedicated to him.A framework for compositional verification of security protocolsUnifying simulatability definitions in cryptographic systems under different timing assumptionsA static analysis of cryptographic processes: the denotational approachLogics for reasoning about cryptographic constructionsVerification of cryptographic protocols: tagging enforces terminationReachability results for timed automata with unbounded data structuresInvariant-based reasoning about parameterized security protocolsWeb security: Authentication protocols and their analysisPattern-matching spi-calculusVulnerability analysis of CSP based on stochastic game theoryESAP: efficient and secure authentication protocol for roaming user in mobile communication networksA Formalization of Credit and Responsibility Within the GNDC SchemaAn extended chaotic-maps-based protocol with key agreement for multiserver environmentsDesign and analysis of a chaotic maps-based three-party authenticated key agreement protocolProbability timed automata for investigating communication processesComparing State Spaces in Automatic Security Protocol AnalysisA computationally grounded logic of graded beliefAuthentication and delegation with smart-cardsEXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUSAutomatic verification of cryptographic protocols with SETHEOA calculus for cryptographic protocols: The spi calculusAbstract Interpretation for Proving Secrecy Properties in Security ProtocolsInformation based reasoning about security protocolsModal Logics for Cryptographic ProcessesA Formal Analysis of Complex Type Flaw Attacks on Security ProtocolsRefinement of Kripke Models for DynamicsAn attack-finding algorithm for security protocols.On the symbolic reduction of processes with cryptographic functions.A new logic for electronic commerce protocolsA comparison of three authentication properties.A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolA Vector Model of Trust for Developing Trustworthy SystemsAbstractions Preserving Parameter ConfidentialityApplying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolTemporal Logics of Knowledge and their Applications in SecurityOn the role of formal methods in security




This page was built for publication: A logic of authentication