Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…This method allows for formal verification of security properties through translation of the spi-calculus specifications to a format that can be verified by ProVerif prior to code generation. -In 1993 and in 2009, Bieber et al [18] and Benaissa et al [12] respectively proposed an approach to analyze the security of cryptographic protocols using the Event-B framework. To the best of our knowledge, they partly implement the Dolev-Yao model as a library for the internal verifier of Event-B, allowing them to specify lemmas describing security properties to be proven such as secrecy and authentication.…”
Section: Cryptographic Protocol Code Generation Toolsmentioning
confidence: 99%
“…This method allows for formal verification of security properties through translation of the spi-calculus specifications to a format that can be verified by ProVerif prior to code generation. -In 1993 and in 2009, Bieber et al [18] and Benaissa et al [12] respectively proposed an approach to analyze the security of cryptographic protocols using the Event-B framework. To the best of our knowledge, they partly implement the Dolev-Yao model as a library for the internal verifier of Event-B, allowing them to specify lemmas describing security properties to be proven such as secrecy and authentication.…”
Section: Cryptographic Protocol Code Generation Toolsmentioning
confidence: 99%
“…Application of the B method. Event-B method has been successfully applied to design critical systems for applications, like control system for the Meteor line 14 in Paris or the VAL shuttle for Paris CDG airport [9], medical devices [40], autonomous systems [42], security protocols [10], control-command systems [23] and distributed protocols [34,48]. More information can be found in [17,39].…”
Section: Event-b Extensions With Theoriesmentioning
confidence: 99%