1998
DOI: 10.21236/ada459060
|View full text |Cite
|
Sign up to set email alerts
|

Strand Spaces: Why is a Security Protocol Correct?

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 86 publications
(41 citation statements)
references
References 14 publications
0
41
0
Order By: Relevance
“…The CPSA is an automated tool functioning on the support of the formal method strand space model. 38,39,41 The CPSA endeavors to discover all feasible dissimilar skeletons. The skeleton narrates the set of feasible executions for a given security protocol.…”
Section: Cpsa Resultsmentioning
confidence: 99%
“…The CPSA is an automated tool functioning on the support of the formal method strand space model. 38,39,41 The CPSA endeavors to discover all feasible dissimilar skeletons. The skeleton narrates the set of feasible executions for a given security protocol.…”
Section: Cpsa Resultsmentioning
confidence: 99%
“…Readers can refer to Fabrega et al . for more information about SSM provided by the original authors.…”
Section: Strand Space Model and Its Limitation For Counterexamplesmentioning
confidence: 99%
“…So it is important for researchers to find the counterexamples. In references , , and , researchers brought out counterexamples directly, but did not explain how to find the counterexamples.…”
Section: Strand Space Model and Its Limitation For Counterexamplesmentioning
confidence: 99%
See 1 more Smart Citation
“…A strand [13] represents the sequence of messages sent and received by a principal executing the protocol or by the intruder. A principal sending (resp.…”
Section: Maude-npa's Execution Modelmentioning
confidence: 99%