1997
DOI: 10.1016/s0164-1212(96)00112-4
|View full text |Cite
|
Sign up to set email alerts
|

Petri net based models for specification and analysis of cryptographic protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2001
2001
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…All of them [6], [8]- [12] with one exception [7] aim at analyzing only one attack trace. The exception [7] offers the analysis of multiple attack traces, but it is inefficient. In fact, all of them employ an off-the-fly trace generation technique which means that an attack trace or multiple attack traces are computed after a state space is generated either partially or fully.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…All of them [6], [8]- [12] with one exception [7] aim at analyzing only one attack trace. The exception [7] offers the analysis of multiple attack traces, but it is inefficient. In fact, all of them employ an off-the-fly trace generation technique which means that an attack trace or multiple attack traces are computed after a state space is generated either partially or fully.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
“…'s works [7], [8] developed place/transition nets which are low-level nets to analyze security protocols. Their method [7] was applied to analyze multiple attack traces for the message replay attack. Also, TMN was chosen as a case study, but only known attacks on TMN were reconstructed.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…They can be classified into two kinds. The first kind [12,[23][24][25][26][27] offers a modeling and analysis method to find attacks. The second kind [28] provides a theoretical semantics for cryptographic protocols which can be used to prove properties of protocols, rather than to find attacks.…”
Section: A Petri Nets For Cryptographic Protocolsmentioning
confidence: 99%
“…In [12,[23][24][25][26][27][28], many Petri nets-based methods have been developed and applied to analyze cryptographic protocols. Most of them offer the analysis of one attack trace only.…”
Section: Introductionmentioning
confidence: 99%