Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography
From MaRDI portal
Publication:953531
DOI10.1016/j.jlap.2008.05.005zbMath1151.94012OpenAlexW2023361932MaRDI QIDQ953531
Publication date: 6 November 2008
Published in: The Journal of Logic and Algebraic Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jlap.2008.05.005
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A calculus of durations
- A calculus for cryptographic protocols: The spi calculus
- Defeasible deontic logic
- Many-dimensional modal logics: theory and applications
- Duration calculus. A formal approach to real-time systems.
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- A new logic for electronic commerce protocols
- Protocols for authentification and key establishment
- Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
- A simple framework for real-time cryptographic protocol analysis with compositional proof rules
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
- Logics for reasoning about cryptographic constructions
- A symbolic decision procedure for cryptographic protocols with time stamps
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Explicit Provability and Constructive Semantics
- Towards an Awareness-Based Semantics for Security Protocol Analysis
- Models for an Adversary-Centric Protocol Logic
- Modal Logics for Cryptographic Processes
- Logic for verifying public-key cryptographic protocols
- Introducing Justification into Epistemic Logic
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- Analyzing security protocols with secrecy types and logic programs
- Representing and Reasoning with Operational Semantics
- On the security of public key protocols
- A logic of authentication
- Optimistic fair exchange of digital signatures
- Foundations of Cryptography
- Foundations of Cryptography
- Mobile values, new names, and secure communication
- A semantics for a logic of authentication (extended abstract)
- Interactive Computation
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Static Analysis
- Correct Hardware Design and Verification Methods
- Verifying security protocols as planning in logic programming
- CONCUR 2005 – Concurrency Theory
This page was built for publication: Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography