Deciding knowledge in security protocols under equational theories

From MaRDI portal
Publication:860894

DOI10.1016/j.tcs.2006.08.032zbMath1153.94339OpenAlexW2060349224WikidataQ115036558 ScholiaQ115036558MaRDI QIDQ860894

Martín Abadi, Véronique Cortier

Publication date: 9 January 2007

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.tcs.2006.08.032




Related Items (39)

Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarityTrace Equivalence and Epistemic Logic to Express Security PropertiesAlgorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystemsModel Checking Security ProtocolsAlice and Bob: Reconciling Formal Models and ImplementationMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesStateful applied pi calculus: observational equivalence and labelled bisimilarityA game-theoretic framework for specification and verification of cryptographic protocolsDeciding equivalence-based properties using constraint solvingAn Equation-Based Classical LogicA Probabilistic Applied Pi–CalculusDeciding Knowledge in Security Protocols for Monoidal Equational TheoriesWhen privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculusUnnamed ItemA pure labeled transition semantics for the applied pi calculusReducing equational theories for the decision of static equivalenceComputing knowledge in security protocols under convergent equational theoriesDecidability and combination results for two notions of knowledge in security protocolsProbabilistic logic over equations and domain restrictionsChallenges in the Automated Verification of Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesIntruder deducibility constraints with negation. Decidability and application to secured service compositionsIntruder deduction problem for locally stable theories with normal forms and inversesAutomated verification of selected equivalences for security protocolsA Complete Symbolic Bisimilarity for an Extended Spi CalculusHierarchical combination of intruder theoriesAutomating Security Analysis: Symbolic Equivalence of Constraint SystemsComputing Knowledge in Security Protocols under Convergent Equational TheoriesCompiling and securing cryptographic protocolsA spatial equational logic for the applied \(\pi \)-calculusDeciding Security for Protocols with Recursive TestsSymbolic Bisimulation for the Applied Pi CalculusA Proof Theoretic Analysis of Intruder TheoriesYAPA: A Generic Tool for Computing Intruder KnowledgeDeciding knowledge in security protocols under some e-voting theoriesComputationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal SetupsFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelFormalizing provable anonymity in Isabelle/HOLTerminating non-disjoint combined unification



Cites Work


This page was built for publication: Deciding knowledge in security protocols under equational theories