2001
DOI: 10.1007/3-540-45608-2_2
|View full text |Cite
|
Sign up to set email alerts
|

The Logic of Authentication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0
1

Year Published

2004
2004
2011
2011

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 92 publications
(50 citation statements)
references
References 89 publications
0
49
0
1
Order By: Relevance
“…As a prerequisite for that, is to re-cast our current development on existing operational models for cryptographic protocols like Strand Spaces [25,23], spi calculus [1], CCS and CSP based models [10,17]. Finally, relationships with approaches based on type systems [11,2,12,2,3], and logics [7,24] deserve to be made.…”
Section: Discussionmentioning
confidence: 99%
“…As a prerequisite for that, is to re-cast our current development on existing operational models for cryptographic protocols like Strand Spaces [25,23], spi calculus [1], CCS and CSP based models [10,17]. Finally, relationships with approaches based on type systems [11,2,12,2,3], and logics [7,24] deserve to be made.…”
Section: Discussionmentioning
confidence: 99%
“…Figure 3 shows the open-ended base of attack actions that in the current implementation of the MI intruder model are checked for their feasibility. The selected attack actions appear as primitive steps in attacks reported in the related bibliography and have been proposed in published taxonomies [17,18,19] that formalize the observations of intruder misbehaviors, where the intruder redirects messages among protocol participants. In [15], we provided formal definitions of the selected primitive attack actions, as well as bibliographic examples, where these attack actions violate security properties of existing protocols.…”
Section: The MI Intruder Model In Usementioning
confidence: 99%
“…Many of these approaches, starting from the well-known BAN logics line (Burrows et al, 1990) either focus on the resulting expressivity (Syverson et al, 2000) to model particular protocols, or integrate it within theorem provers. More recently the specific protocols have been analysed in an ad-hoc basis by means of temporalepistemic model checkers (Meyden et al, 2004a;Lomuscio et al, 2007;Kacprzak et al, 2008) with anonymity protocols such as Chaum's dining cryptographers (Chaum, 1988) receiving considerable attention (Kacprzak et al, 2006;Meyden et al, 2004b).…”
Section: Conclusion and Related Workmentioning
confidence: 99%