2005
DOI: 10.1016/j.jlap.2004.09.007
|View full text |Cite
|
Sign up to set email alerts
|

A symbolic decision procedure for cryptographic protocols with time stamps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…• Model-based formalisms (process calculi): [ES00], [GM04], [HJ05] with discrete time; [Sch99], [BEL05], and our own contribution (cf. Section 4.2) with dense time…”
Section: Historical and Topical Contextmentioning
confidence: 99%
See 2 more Smart Citations
“…• Model-based formalisms (process calculi): [ES00], [GM04], [HJ05] with discrete time; [Sch99], [BEL05], and our own contribution (cf. Section 4.2) with dense time…”
Section: Historical and Topical Contextmentioning
confidence: 99%
“…• Property-based formalisms (logics): interval -based [HS04a]; time-parametrised epistemic modalities [KM99] and a second-order logic [BEL05] both point-based, and our hereby presented logic tCPL allowing for both temporal points and intervals.…”
Section: Historical and Topical Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…They not only have extended their method to model replay attacks, but also have succeeded in applying their method to the Yahalom protocol and the Kerberos IV protocol. Recently, Bozga et al [18] proposed an approach based on timed automata, symbolic verification techniques and temporal logic to analyze security protocols with timestamps. But they haven't applied their approach to any real-world security protocols.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…In [DG04,BEL05] symbolic models for protocols with timestamps are introduced and techniques to analyze protocols within these models are described. In [KLP07] the timing model is similar to ours, however, the paper is concerned with secure multi-party computation.…”
Section: Introductionmentioning
confidence: 99%