An intruder model for verifying liveness in security protocols

被引:0
|
作者
Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands [1 ]
不详 [2 ]
机构
关键词
D O I
10.1145/1180337.1180340
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Knowledge Based Approach for Mechanically Verifying Security Protocols
    Ma, Xiaoqi
    Cheng, Xiaochun
    McCrindle, Rachel
    19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
  • [22] Formally verifying security protocols built on watermarking and jamming
    Costa, Gabriele
    Degano, Pierpaolo
    Galletta, Letterio
    Soderi, Simone
    COMPUTERS & SECURITY, 2023, 128
  • [23] Strategy for verifying security protocols with unbounded message size
    Chevalier Y.
    Vigneron L.
    Automated Software Engineering, 2004, 11 (2) : 141 - 166
  • [24] Modeling and Verifying Security Protocols Using UML 2
    Smith, Sandra
    Beaulieu, Alain
    Phillips, W. Greg
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 72 - 79
  • [25] Modeling and Verifying Time Sensitive Security Protocols with Constraints
    Zhou, Ti
    Li, Mengjun
    Li, Zhoujun
    Chen, Huowang
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 212 (0C) : 103 - 118
  • [26] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
    Schaller, Patrick
    Schmidt, Benedikt
    Basin, David
    Capkun, Srdjan
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
  • [27] Verifying security protocols with PVS: widening the rank function approach
    Evans, N
    Schneider, S
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (02): : 253 - 284
  • [28] Safety and liveness for an RBAC/MAC security model
    Phillips, C
    Demurjian, S
    Ting, TC
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 316 - 329
  • [29] Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service
    Li, Xiaohong
    Xu, Jiayi
    Xu, Guangquan
    Hao, Jianye
    Li, Xiaoru
    Feng, Zhiyong
    Gao, Honghao
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (04) : 563 - 585
  • [30] Secrecy for Bounded Security Protocols: disequality tests and an intruder with existentials lead to undecidability
    Birjoveanu, Catalin V.
    PROCEEDINGS OF THE 2009 FOURTH BALKAN CONFERENCE IN INFORMATICS, 2009, : 22 - 27