Show simple item record

dc.contributor.authorSu, Kai-Le
dc.contributor.authorChen, Qing-Liang
dc.contributor.authorSattar, Abdul
dc.contributor.authorYue, Wei-Ya
dc.contributor.authorLv, Guan-Feng
dc.contributor.authorZheng, Xi-Zhong
dc.date.accessioned2017-05-03T14:39:32Z
dc.date.available2017-05-03T14:39:32Z
dc.date.issued2006
dc.date.modified2007-08-07T04:52:24Z
dc.identifier.issn1000-9000
dc.identifier.urihttp://hdl.handle.net/10072/11407
dc.description.abstractThis paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficult-to-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.languageEnglish
dc.language.isoeng
dc.publisherSpringer
dc.publisher.placeNew York
dc.publisher.urihttps://link.springer.com/journal/11390/volumes-and-issues/21-6
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofpagefrom932
dc.relation.ispartofpageto943
dc.relation.ispartofissue6
dc.relation.ispartofjournalJournal of Computer Science and Technology
dc.relation.ispartofvolume21
dc.rights.retentionY
dc.subject.fieldofresearchInformation and computing sciences
dc.subject.fieldofresearchcode46
dc.titleVerification of Authentication Protocols for Epistemic Goals via SAT Compilation
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2006 Springer : Reproduced in accordance with the copyright policy of the publisher : The original publication will be available at SpringerLink (use hypertext links)
gro.date.issued2006
gro.hasfulltextNo Full Text
gro.griffith.authorSattar, Abdul
gro.griffith.authorSu, Kaile


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record