Show simple item record

dc.contributor.authorKaile, SU
dc.contributor.authorGuanfeng, LU
dc.contributor.authorQingliang, CHEN
dc.date.accessioned2017-05-03T14:39:42Z
dc.date.available2017-05-03T14:39:42Z
dc.date.issued2005
dc.date.modified2014-02-20T22:38:10Z
dc.identifier.issn1674733X
dc.identifier.doi10.1360/122004-78
dc.identifier.urihttp://hdl.handle.net/10072/56975
dc.description.abstractThe standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics, the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more, the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsificationoriented, i.e. finding bugs in protocols.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.languageEnglish
dc.language.isoeng
dc.publisherZhongguo Kexue Zazhishe
dc.publisher.placeChina
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofpagefrom513
dc.relation.ispartofpageto532
dc.relation.ispartofissue4
dc.relation.ispartofjournalScience in China Ser. F Information Sciences
dc.relation.ispartofvolume48
dc.rights.retentionY
dc.subject.fieldofresearchComputational logic and formal languages
dc.subject.fieldofresearchData management and data science
dc.subject.fieldofresearchInformation systems
dc.subject.fieldofresearchOther information and computing sciences
dc.subject.fieldofresearchcode461303
dc.subject.fieldofresearchcode4605
dc.subject.fieldofresearchcode4609
dc.subject.fieldofresearchcode4699
dc.titleKnowledge structure approach to verification of authentication protocols
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
gro.date.issued2005
gro.hasfulltextNo Full Text
gro.griffith.authorSu, Kaile


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record