SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Kai-Le Su, Qing-Liang Chen, Abdul Sattar, Wei-Ya Yue, Guan-Feng Lv, Xi-Zhong Zheng. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation[J]. Journal of Computer Science and Technology, 2006, 21(6): 932-943. |
[1] |
Hintikka J. Knowledge and Belief. Ithaca, NY: Cornell University Press, 1962.
|
[2] |
Fagin R, Halpern J, Moses Y, Vardi M. Reasoning about Knowledge. Cambridge, MA: MIT Press, 1995.
|
[3] |
Halpern J, Zuck L. A little knowledge goes a long way: -Simple} knowledge based derivations and correctness proofs for a family of protocols. -\it Journal of the ACM}, 1992, 39(3): 449--478.
|
[4] |
Stulp F, Verbrugge R. A knowledge-based algorithm for the Internet protocol -TCP}. -\it Bulletin of Economic Research}, 2002, 54(1): 69--94.
|
[5] |
Burrows M, Abadi M, Needham R M. A logic of authentication. -\it ACM Trans. Computer Systems}, 1990, 8(1): 18--36.
|
[6] |
Li Gong, Roger Needham, Raphael Yahalom. Reasoning about beliefs in cryptographic protocols. In -\it Proc. IEEE Computer Society Symposium on Research in Security and Privacy}, Los Alamitos, California, 1990, IEEE Computer Society Press, pp.234--248.
|
[7] |
Abadi M, Tuttle M R. A semantics for a logic of authentication. In -\it Proc. the 10th Annual ACM Symp. Principles of Distributed Computing}, Montreal, Canada, 1991, pp.201--216.
|
[8] |
Boyd C, Mao M. On a limitation of -BAN} logic. In -\it Proc. EUROCRYPT'93}, Lofthus, Norway: Springer-Verlag, -\it LNCS 765}, 1993, pp.240--247.
|
[9] |
P van Oorschot. Extending cryptographic logics of belief to key agreement. In -\it Proc. 1st ACM Conf. Computer and Communications Security}, Fairfax, USA, Nov. 1993, pp.232--243.
|
[10] |
P F Syverson, P C van Oorschot. A unified cryptographic protocol logic. Technical Report 5540-227, CHACS, Naval Research Lab, 1996.
|
[11] |
Kaile Su, Guanfeng Lv, Yan Zhang. Reasoning about knowledge by variable forgetting. In -\it Proc. the 9th Int. Conf. Principles of Knowledge Representation and Reasoning KR-2004}, Whistler, Canada, June 2004, pp.576--586.
|
[12] |
Lowe G. A hierarchy of authentication specifications. In -\it Proc. 10th IEEE Computer Security Foundations Workshop}, IEEE Computer Society Press, Rockport, USA, 1997, pp.31--43.
|
[13] |
Kaile Su, Guanfeng Lv, Qingliang Chen. Knowledge structure approach to verification of authentication protocols. -\it Science in China, Series E: Information Sciences}, April 2005, 35(4): 337--351.
|
[14] |
Needham R M, Schroeder M D. Using encryption for authentication in large networks of computers. -\it Communication of the ACM}, 1978, 21(12): 993--999.
|
[15] |
Gavin Lowe. Breaking and Fixing the -Needham-Schroeder} Public-Key Protocol using -FDR}. Tools and Algorithms for the Construction and Analysis of Systems, Margaria and Steffen (eds.), -\it LNCS 1055}, Passau, Germany: Springer Verlag, 1996, pp.147--166.
|
[16] |
Kripke S. A semantical analysis of modal logic. I: Normal modal propositional calculi. -\it Z. Math. Logik Grundl. Math.}, 1963, 9: 67--96.
|
[17] |
Fangzhen Lin. On strongest necessary and weakest sufficient conditions. In -\it Proc. Seventh Int. Conf. Principles of Knowledge Representation and Reasoning}, Breckenridge, Colorado, USA, April 11--15, 2000, pp.167--175.
|
[18] |
Dolev D, Yao A C. On the security of public-key protocols. -\it IEEE Trans. Information Theory}, Aug. 1983, 29(8): 198--208.
|
[19] |
Durgin N, Lincoln P, Mitchell J, Scedrov A. Undecidability of bounded security protocols. In -\it Proc. Workshop on Formal Methods and Security Protocols (FMSP'99)}, Trento, Italy, 1999, http://citeseer. nj.nec.com/durgin99undecidability.html.
|
[20] |
Iliano Cervesato, Catherine Meadows, Dusko Pavlovic. An encapsulated authentication logic for reasoning about key distribution protocol. In -\it Eighteenth Computer Security Foundations Workshop --- CSFW-18}, IEEE Computer Society Press, Aix-en-Provence, France, 20--22 June, 2005, pp.48--61.
|
[21] |
Nancy A Durgin, John C Mitchell, Dusko Pavlovic. A compositional logic for proving security properties of protocols. -\it Journal of Computer Security}, 2003, 11(4): 677--722.
|
[22] |
F Javier Thayer, Jonathan C Herzog, Joshua D Guttman. Strand spaces. Technical Report, The MITRE Corporation, Nov. 1997.
|
[23] |
John V Franco, Michal Kouril, John S Schlipf \it et al. \rm SBSAT: A state-based, BDD-based satisfiability solver. In -\it Proc. the Theory and Applications of Satisfiability Testing, 6th Int. Conf., SAT 2003.}, Santa Margherita Ligure, Italy, Springer, -\it LNCS 2919}, 2003, pp.398--410.
|
[24] |
Pierre Bieber. A logic of communication in hostile environment. In -\it Proc. the 3rd IEEE Computer Security Foundations Workshop}, Franconia, USA, IEEE Computer Society Press, June 1990, pp.14--22.
|
[25] |
Clarke E, Jha S Marrero. A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols. In -\it Proc. 13th IEEE Annual Symposium on Logic in Computer Science -LICS98} Workshop on Formal Methods and Security Protocols}, Indianapolis, Indiana, June 21--24, 1998, http://citeseer.ist.psu.edu/clarke98machine.html.
|
[26] |
Paul Syverson. Towards a strand semantics for authentication logic. -\it Electronic Notes in Theoretical Computer Science}, 1999, http://www.elsevier.nl/locate/entcs/volume20.html.
|
[27] |
Joseph Y Halpern, Riccardo Pucella. On the relationship between strand spaces and multi-agent systems. -\it ACM Trans. Inf. Syst. Secur.}, 2003, 6(1): 43--70.
|
[28] |
Anupam Datta, Ante Derek, John C Mitchell, Dusko Pavlovic. A derivation system for security protocols and its logical formalization. In -\it 16th IEEE Computer Security Foundations Workshop CSFW-16 2003}, Pacific Grove, CA, USA, IEEE Computer Society, June 30--July 2, 2003, pp.109--125.
|
[29] |
Li Mengjun, Li Zhoujun, Chen Huowang. A survey of security protocol verification based on process algebra. -\it Chinese J. Computer Research and Development}, July 2004, 41(7): 1097--1103.
|
[30] |
Abadi M, Gordon A. A calculus for cryptographic protocols: The spi calculus. In -\it Proc. 4th ACM Conf. Computer and Communication Security}, Zurich, Switzerland, April 1997, pp.36--47.
|
[31] |
Huai Jinpeng, Li Xianxian. Algebra model and security analysis for cryptographic protocols. -\it Science in China, Series F: Information Sciences}, Feb. 2004, 47(2): 199--220.
|
[32] |
Xue Rui, Feng Deng-Guo. New semantic model for authentication protocols in -ASMs}. -\it J. Comput. Sci. & Tech.}, 2004, 19(4): 555--563.
|
[33] |
Clarke E M, Jha S, Marrero W. Verifying security protocols with Brutus. -\it ACM Trans. Software Engineering and Methodology}, October 2000, 9(4): 443--487.
|
[34] |
Song D, Berezin S, Perrig A. Athena: A novel approach to efficient automatic security protocol analysis. -\it Journal of Computer Security}, 2001, 9(1, 2): 47--74.
|