2015
DOI: 10.1049/cje.2015.01.031
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The proof system of event logic is improved from first-order logic, including a series of axioms, theorems, and inference rules. The axiom system of event logic includes six core axioms, which are key axiom, causality axiom, disjoint axiom, honesty axiom, flow relation, and random number axiom [28,29]. These axioms constitute the core of logic proof system, which can be used to prove whether the authentication and confidentiality of the protocol are satisfied.…”
Section: The Event Logic and Its Extension 321 Brief Introduction Of ...mentioning
confidence: 99%
“…The proof system of event logic is improved from first-order logic, including a series of axioms, theorems, and inference rules. The axiom system of event logic includes six core axioms, which are key axiom, causality axiom, disjoint axiom, honesty axiom, flow relation, and random number axiom [28,29]. These axioms constitute the core of logic proof system, which can be used to prove whether the authentication and confidentiality of the protocol are satisfied.…”
Section: The Event Logic and Its Extension 321 Brief Introduction Of ...mentioning
confidence: 99%
“…Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the securityrelated and cryptographic protocols used over open networks and distributed systems [14,15] . Formal methods, including model checking and theorem proving have been applied to analyze the security of cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%
“…mechanism of LoET, and focused on the latest supplement to the logical framework, which can be used to prove the security attributes of the cryptographic protocols [3]. Now LoET is an axiomatic method based on theorem proving and this logic is designed around a message automation with actions for possible protocol steps [3], [6]. Moreover, this theorem ensures that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocols [3].…”
Section: Introductionmentioning
confidence: 99%