Proceedings First IEEE International Conference on Formal Engineering Methods
DOI: 10.1109/icfem.1997.630399
|View full text |Cite
|
Sign up to set email alerts
|

Formal automatic verification of authentication cryptographic protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The role-based specification is a model to formalize the cencept of valid traces of a protocol. More details about the role-based specification are in [34,31,32,15]. + A valid trace is an instantiated messages of the generalized roles where each message sent by the intruder can be generated by her using her capacity and the prior messages.…”
Section: Notationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The role-based specification is a model to formalize the cencept of valid traces of a protocol. More details about the role-based specification are in [34,31,32,15]. + A valid trace is an instantiated messages of the generalized roles where each message sent by the intruder can be generated by her using her capacity and the prior messages.…”
Section: Notationsmentioning
confidence: 99%
“…Alike, Houmani et al [27,28,29,30] defined universal functions called interpretation functions that were able to verify protocols statically. They operate on an abstraction of the protocol called generalized roles in a role-based specification [31,32,15]. An interpretation function must meet few conditions to be considered safe for analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The role-based specification expresses the notion of valid traces of a protocol. More details about the role-based specification could be found in [10][11][12][13].…”
Section: Preliminary and Notationsmentioning
confidence: 99%
“…At the communication level the use of cryptographic protocols aims at protecting from security breaches. This issue is being actively studied in order to ensure the absence of flaws in such protocols [1,7,[11][12][13]. At the application level, malicious code could be inserted in applications without the consent nor the knowledge of end users.…”
Section: Motivationmentioning
confidence: 99%