1994
DOI: 10.1007/978-1-4471-3240-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Formal Development of Authentication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

1997
1997
2013
2013

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…Examples are classical refinement and using abstract channels with security properties [17,4] and Guttman's protocol transformations based on strand spaces [9,8]. Sprenger and Basin [17] have recently proposed a refinement strategy for security protocols that spans several different abstraction levels (including, e.g., confidential and authentic channels).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples are classical refinement and using abstract channels with security properties [17,4] and Guttman's protocol transformations based on strand spaces [9,8]. Sprenger and Basin [17] have recently proposed a refinement strategy for security protocols that spans several different abstraction levels (including, e.g., confidential and authentic channels).…”
Section: Related Workmentioning
confidence: 99%
“…Protocol transformations are interesting for at least two applications: we can use them (1) to develop (families of) protocols by refinement [17,9,16,7,6,4] and (2) to abstract existing protocols for the more efficient tool-based verification of their properties [11]. Abstraction and refinement correspond bottom-up and top-down views on (the same) protocol transformations.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, in related work such as [6,9,12,23], the authors do not continue the refinements down to the level of a standard Dolev-Yao model based on an algebra of cryptographic messages; some use ad-hoc, protocol-dependent intruder definitions. This makes it difficult to compare their models with existing work on protocol modeling and verification and to know for which adversaries their properties hold.…”
Section: Levelmentioning
confidence: 99%
“…There have been other proposals for developing security protocols by refinement using different formalisms such as the B method [9], its combination with CSP [12], I/O automata [23], and ASMs [6]. None of these continue their refinements to the level of a full Dolev-Yao intruder.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation