dc.contributor.author | Kaile, SU | |
dc.contributor.author | Guanfeng, LU | |
dc.contributor.author | Qingliang, CHEN | |
dc.date.accessioned | 2017-05-03T14:39:42Z | |
dc.date.available | 2017-05-03T14:39:42Z | |
dc.date.issued | 2005 | |
dc.date.modified | 2014-02-20T22:38:10Z | |
dc.identifier.issn | 1674733X | |
dc.identifier.doi | 10.1360/122004-78 | |
dc.identifier.uri | http://hdl.handle.net/10072/56975 | |
dc.description.abstract | The standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics, the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more, the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsificationoriented, i.e. finding bugs in protocols. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Zhongguo Kexue Zazhishe | |
dc.publisher.place | China | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofpagefrom | 513 | |
dc.relation.ispartofpageto | 532 | |
dc.relation.ispartofissue | 4 | |
dc.relation.ispartofjournal | Science in China Ser. F Information Sciences | |
dc.relation.ispartofvolume | 48 | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Computational logic and formal languages | |
dc.subject.fieldofresearch | Data management and data science | |
dc.subject.fieldofresearch | Information systems | |
dc.subject.fieldofresearch | Other information and computing sciences | |
dc.subject.fieldofresearchcode | 461303 | |
dc.subject.fieldofresearchcode | 4605 | |
dc.subject.fieldofresearchcode | 4609 | |
dc.subject.fieldofresearchcode | 4699 | |
dc.title | Knowledge structure approach to verification of authentication protocols | |
dc.type | Journal article | |
dc.type.description | C1 - Articles | |
dc.type.code | C - Journal Articles | |
gro.date.issued | 2005 | |
gro.hasfulltext | No Full Text | |
gro.griffith.author | Su, Kaile | |