[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/LICS.2005.8guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Automated Verification of Selected Equivalences for Security Protocols

Published: 26 June 2005 Publication History

Abstract

In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. We focus on proving equivalences P ? Q in which P and Q are two processes that differ only in the choice of some terms. These equivalences arise often in applications. We show how to treat them as predicates on the behaviors of a process that represents P and Q at the same time. We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
LICS '05: Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science
June 2005
459 pages
ISBN:0769522661

Publisher

IEEE Computer Society

United States

Publication History

Published: 26 June 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)CoSMedJournal of Automated Reasoning10.1007/s10817-017-9443-361:1-4(113-139)Online publication date: 1-Jun-2018
  • (2017)Verification of randomized security protocolsProceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science10.5555/3329995.3330061(1-12)Online publication date: 20-Jun-2017
  • (2017)Symbolically analyzing security protocols using tamarinACM SIGLOG News10.1145/3157831.31578354:4(19-30)Online publication date: 3-Nov-2017
  • (2017)Automated Analysis of Secure Internet of Things ProtocolsProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134624(238-249)Online publication date: 4-Dec-2017
  • (2016)Automated Verification of Equivalence Properties of Cryptographic ProtocolsACM Transactions on Computational Logic10.1145/292671517:4(1-32)Online publication date: 20-Sep-2016
  • (2015)From Security Protocols to Pushdown AutomataACM Transactions on Computational Logic10.1145/281126217:1(1-45)Online publication date: 23-Sep-2015
  • (2015)Defeating IMSI CatchersProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813615(340-351)Online publication date: 12-Oct-2015
  • (2015)Formal verification of e-votingACM SIGLOG News10.1145/2728816.27288232:1(25-34)Online publication date: 28-Jan-2015
  • (2015)Timing Attacks in Security ProtocolsProceedings of the 4th International Conference on Principles of Security and Trust - Volume 903610.1007/978-3-662-46666-7_15(280-299)Online publication date: 11-Apr-2015
  • (2014)Formal Models and Techniques for Analyzing Security ProtocolsFoundations and Trends in Programming Languages10.1561/25000000011:3(151-267)Online publication date: 13-Nov-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media