To know or not to know: Epistemic approaches to security protocol verification
DOI10.1007/s11229-010-9765-8zbMath1225.03017OpenAlexW2106238708MaRDI QIDQ625717
Yanjing Wang, Francien Dechesne
Publication date: 25 February 2011
Published in: Synthese (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11229-010-9765-8
verificationtemporal logicdynamic epistemic logicepistemic temporal logicsecurity protocolinterpreted systems
Logic in artificial intelligence (68T27) Logics of knowledge and belief (including belief change) (03B42) Specification and verification (program logics, model checking, etc.) (68Q60) Temporal logic (03B44)
Related Items (4)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Dealing with logical omniscience: expressiveness and pragmatics
- Logics of communication and change
- Probabilistic dynamic belief revision
- Dynamic epistemic logic with branching temporal structures
- Merging frameworks for interaction
- Uniform inevitability is tree automaton ineffable
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- Modelling knowledge and action in distributed systems
- Reasoning about information change
- A knowledge based semantics of messages
- The Russian cards problem
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Bounds on secret key exchange using a random deal of cards
- Update semantics of security protocols
- An essay in modal logic
- Towards an Awareness-Based Semantics for Security Protocol Analysis
- Modeling Adversaries in a Logic for Security Protocol Analysis
- Symbolic Model Checking for Temporal-Epistemic Logic
- The Logic of Public Announcements, Common Knowledge, and Private Suspicions
- Logic of Information Flow on Communication Channels
- Knowledge and common knowledge in a distributed environment
- Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
- Formalising Receipt-Freeness
- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
- Preserving Secrecy Under Refinement
- A Data Symmetry Reduction Technique for Temporal-epistemic Logic
- Monadic second order definable relations on the binary tree
- A Theory of Communicating Sequential Processes
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- A logic of authentication
- Mobile values, new names, and secure communication
- Automatic verification of temporal-epistemic properties of cryptographic protocols
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- A semantics for a logic of authentication (extended abstract)
- Programming Languages and Systems
- Computer Aided Verification
- Model Checking Knowledge and Linear Time: PSPACE Cases
- Automata, Languages and Programming
- Deductive Algorithmic Knowledge
- Refinement of Kripke Models for Dynamics
- Model Checking on Trees with Path Equivalences
- CONCUR 2005 – Concurrency Theory
- Foundations of Security Analysis and Design II
This page was built for publication: To know or not to know: Epistemic approaches to security protocol verification