Analysis of cryptographic protocols using logics of belief: an overview
When designing a cryptographic protocol or explaining it, one often uses arguments such as ``since this message was signed by machine B, machine A can be sure it came from B`` in informal proofs justifying how the protocol works. Since it is, in such informal proofs, often easy to overlook an essen...
| 出版年: | Journal of Telecommunications and Information Technology |
|---|---|
| 第一著者: | David Monniaux |
| フォーマット: | 論文 |
| 言語: | 英語 |
| 出版事項: |
National Institute of Telecommunications
2002-12-01
|
| 主題: | |
| オンライン・アクセス: | https://jtit.pl/jtit/article/view/145 |
類似資料
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
著者:: Xiaojuan Chen, 等
出版事項: (2020-09-01)
著者:: Xiaojuan Chen, 等
出版事項: (2020-09-01)
Is it possible to decide whether a cryptographic protocol is secure or not?
著者:: Hubert Comon, 等
出版事項: (2002-12-01)
著者:: Hubert Comon, 等
出版事項: (2002-12-01)
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
著者:: Nadezhda S. Mogilevskaya
出版事項: (2012-03-01)
著者:: Nadezhda S. Mogilevskaya
出版事項: (2012-03-01)
cryptographic Primitives: Insertions, Examples and Open Problems
著者:: Stanislav Olegovich Dordzhiev, 等
出版事項: (2014-02-01)
著者:: Stanislav Olegovich Dordzhiev, 等
出版事項: (2014-02-01)
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
著者:: Kevin Andrae Delgado-Vargas, 等
出版事項: (2023-01-01)
著者:: Kevin Andrae Delgado-Vargas, 等
出版事項: (2023-01-01)
Decidability Preservation and Complexity Bounds for Combined Logics
著者:: Carlos Caleiro, 等
出版事項: (2022-09-01)
著者:: Carlos Caleiro, 等
出版事項: (2022-09-01)
Minimum Round Card-Based Cryptographic Protocols Using Private Operations
著者:: Hibiki Ono, 等
出版事項: (2021-07-01)
著者:: Hibiki Ono, 等
出版事項: (2021-07-01)
A survey on the application of blockchain in cryptographic protocols
著者:: Xiangyang Luo, 等
出版事項: (2024-12-01)
著者:: Xiangyang Luo, 等
出版事項: (2024-12-01)
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments
著者:: Cuong Trinh, 等
出版事項: (2020-01-01)
著者:: Cuong Trinh, 等
出版事項: (2020-01-01)
A Syntactic Proof of the Decidability of First-Order Monadic Logic
著者:: Eugenio Orlandelli, 等
出版事項: (2024-02-01)
著者:: Eugenio Orlandelli, 等
出版事項: (2024-02-01)
The Satisfiability Problem in Linear Multi-agent Knowledge Logic Based on N
著者:: N.A. Protsenko, 等
出版事項: (2024-09-01)
著者:: N.A. Protsenko, 等
出版事項: (2024-09-01)
VSKAP-IoD: A Verifiably Secure Key Agreement Protocol for Securing IoD Environment
著者:: Abdulrahman Ahmed Alzahrani
出版事項: (2024-01-01)
著者:: Abdulrahman Ahmed Alzahrani
出版事項: (2024-01-01)
Specialization of derivations in modal logic S5
著者:: Aida Pliuškevičienė
出版事項: (2023-09-01)
著者:: Aida Pliuškevičienė
出版事項: (2023-09-01)
Specialization of derivations in modal logic S5
著者:: Aida Pliuškevičienė
出版事項: (2023-09-01)
著者:: Aida Pliuškevičienė
出版事項: (2023-09-01)
Cryptographic mechanisms for secure interaction of control and measuring devices
著者:: Alexey Yu. Nesterenko, 等
出版事項: (2020-12-01)
著者:: Alexey Yu. Nesterenko, 等
出版事項: (2020-12-01)
Monitoring approach for online security of cryptographic protocol
著者:: Yu-na ZHU, 等
出版事項: (2016-06-01)
著者:: Yu-na ZHU, 等
出版事項: (2016-06-01)
Monitoring approach for online security of cryptographic protocol
著者:: Yu-na ZHU, 等
出版事項: (2016-06-01)
著者:: Yu-na ZHU, 等
出版事項: (2016-06-01)
Intransitive Temporal Multi-agent Logic with Agents’ Multi-valuations. Decidability
著者:: K. V. Grekovich, 等
出版事項: (2025-03-01)
著者:: K. V. Grekovich, 等
出版事項: (2025-03-01)
Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences
著者:: LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
出版事項: (2024-03-01)
著者:: LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
出版事項: (2024-03-01)
LLAKEP: A Low-Latency Authentication and Key Exchange Protocol for Energy Internet of Things in the Metaverse Era
著者:: Xin Zhang, 等
出版事項: (2022-07-01)
著者:: Xin Zhang, 等
出版事項: (2022-07-01)
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
著者:: Roman Gevorkovich Korkikian, 等
出版事項: (2014-05-01)
著者:: Roman Gevorkovich Korkikian, 等
出版事項: (2014-05-01)
MOORE’S PARADOX AND THE LOGIC OF BELIEF
著者:: ANDRÉS PÁEZ
出版事項: (2020-07-01)
著者:: ANDRÉS PÁEZ
出版事項: (2020-07-01)
Generalized Neutrosophic Sets and Its Application in KU-Algebras University of New Mexico
著者:: Ramesh Kumar D, 等
出版事項: (2025-05-01)
著者:: Ramesh Kumar D, 等
出版事項: (2025-05-01)
A Novel Scalable Quantum Protocol for the Dining Cryptographers Problem
著者:: Peristera Karananou, 等
出版事項: (2024-03-01)
著者:: Peristera Karananou, 等
出版事項: (2024-03-01)
Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms
著者:: LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun
出版事項: (2024-02-01)
著者:: LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun
出版事項: (2024-02-01)
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM
著者:: Qiang Li, 等
出版事項: (2025-04-01)
著者:: Qiang Li, 等
出版事項: (2025-04-01)
Method of designing security protocol for remote attestation
著者:: YU Rong-wei1, 等
出版事項: (2008-01-01)
著者:: YU Rong-wei1, 等
出版事項: (2008-01-01)
Method of designing security protocol for remote attestation
著者:: YU Rong-wei1, 等
出版事項: (2008-01-01)
著者:: YU Rong-wei1, 等
出版事項: (2008-01-01)
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
著者:: Alireza Abdellahi Khorasgani, 等
出版事項: (2023-07-01)
著者:: Alireza Abdellahi Khorasgani, 等
出版事項: (2023-07-01)
Formulas Expressing Totally Nonstable Truth Values of Formulas
著者:: V.V. Rybakov, 等
出版事項: (2023-06-01)
著者:: V.V. Rybakov, 等
出版事項: (2023-06-01)
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
著者:: Purushottam Singh, 等
出版事項: (2025-01-01)
著者:: Purushottam Singh, 等
出版事項: (2025-01-01)
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
著者:: Abdullah M. Almuhaideb, 等
出版事項: (2022-08-01)
著者:: Abdullah M. Almuhaideb, 等
出版事項: (2022-08-01)
Enhanced modified SecOC protocol for secure automotive networks a comprehensive cryptographic framework
著者:: Amjad Nsour, 等
出版事項: (2025-07-01)
著者:: Amjad Nsour, 等
出版事項: (2025-07-01)
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
著者:: P. V. Razumov, 等
出版事項: (2019-06-01)
著者:: P. V. Razumov, 等
出版事項: (2019-06-01)
A Shared-Key Security Protocol and Its Flaw
著者:: Waseem Akhtar Mufti
出版事項: (2005-06-01)
著者:: Waseem Akhtar Mufti
出版事項: (2005-06-01)
THE IMPLEMENTATION OF STRICT STABLE CRYPTOGRAPHIC CODING OPERATIONS
著者:: Volodymyr Rudnytskyi, 等
出版事項: (2019-11-01)
著者:: Volodymyr Rudnytskyi, 等
出版事項: (2019-11-01)
On the cryptographic properties of “Limonnik-3” AKE scheme
著者:: Sergey V. Grebnev
出版事項: (2019-06-01)
著者:: Sergey V. Grebnev
出版事項: (2019-06-01)
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain
著者:: MyeongHyun Kim, 等
出版事項: (2020-05-01)
著者:: MyeongHyun Kim, 等
出版事項: (2020-05-01)
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
著者:: Daniel Cervantes‐Vázquez, 等
出版事項: (2021-09-01)
著者:: Daniel Cervantes‐Vázquez, 等
出版事項: (2021-09-01)
Authentication of RSA via BAN logic
著者:: Salah A. K. Albermany, 等
出版事項: (2019-05-01)
著者:: Salah A. K. Albermany, 等
出版事項: (2019-05-01)
類似資料
-
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
著者:: Xiaojuan Chen, 等
出版事項: (2020-09-01) -
Is it possible to decide whether a cryptographic protocol is secure or not?
著者:: Hubert Comon, 等
出版事項: (2002-12-01) -
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
著者:: Nadezhda S. Mogilevskaya
出版事項: (2012-03-01) -
cryptographic Primitives: Insertions, Examples and Open Problems
著者:: Stanislav Olegovich Dordzhiev, 等
出版事項: (2014-02-01) -
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
著者:: Kevin Andrae Delgado-Vargas, 等
出版事項: (2023-01-01)
