Sciweavers

137 search results - page 2 / 28
» Automated Reasoning for Security Protocol Analysis
Sort
View
LOPSTR
2001
Springer
13 years 10 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
CADE
2009
Springer
14 years 6 months ago
Computing Knowledge in Security Protocols under Convergent Equational Theories
In the symbolic analysis of security protocols, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We propose a proce...
Stéphanie Delaune, Stefan Ciobâca, St...
TARK
2005
Springer
13 years 11 months ago
Deciding knowledge properties of security protocols
Ramaswamy Ramanujam, S. P. Suresh
CADE
2008
Springer
14 years 6 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh
ENTCS
2006
137views more  ENTCS 2006»
13 years 6 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò