Automated verification of selected equivalences for security protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Unbounded Verification of Security Protocols

HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt età la diffusion de documents scientifiques de niveau r...

متن کامل

An Empirical Analysis of Automated Verification of Wireless Security Protocols

Formal verification of security protocols is an important step in the design of security protocols. It helps to reduce the potential of designing faulty protocols and thus increases the confidence in their use. Automated techniques reduce the potential for human errors during verification. This paper presents an empirical study of an automated proving system on the analysis of two wireless comm...

متن کامل

Challenges in the Automated Verification of Security Protocols

The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.

متن کامل

Automated Verification of Timed Security Protocols with Clock Drift

Time is frequently used in security protocols to provide better security. For instance, critical credentials often have limited lifetime which improves the security against brute-force attacks. However, it is challenging to correctly use time in protocol design, due to the existence of clock drift in practice. In this work, we develop a systematic method to formally specify as well as automatic...

متن کامل

EquivalEncEs and calculi for formal vErification of cryptographic protocols

Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptographic primitives are flawless, facilitates the construction of formal models and verification tools. Such models are often based on process cal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Logic and Algebraic Programming

سال: 2008

ISSN: 1567-8326

DOI: 10.1016/j.jlap.2007.06.002