Conference paper

OČENÁŠEK Pavel and TRCHALÍK Roman. Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison. In: Proceedings of the 7th International Carpathian Control Conference. Ostrava: VŠB-Technical University of Ostrava, 2006, pp. 401-404. ISBN 80-248-1066-2.
Publication language:english
Original title:Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison
Title (cs):Modální logiky používané pro analýzu autentizačních protokolů: přehled a srovnání
Pages:401-404
Proceedings:Proceedings of the 7th International Carpathian Control Conference
Conference:7th International Carpathian Control Conference: ICCC 2006
Place:Ostrava, CZ
Year:2006
ISBN:80-248-1066-2
Publisher:VŠB-Technical University of Ostrava
URL:http://www.icc-conf.cz/conference/iccc2006/RegForm/PaperFree.asp?Unit=3&IDPaper=1474 [HTML]
Keywords
authentication protocol, modal logic, design, verification
Annotation
Weaknesses in authentication protocols (AP) are hard to identify, as they can be the result of subtle design flaws. The formal verification of authentication protocols may be done in two ways. One possibility is to use a modal logic of authentication. The other possibility is to use general purpose formal methods. This paper provides a survey through the world of modal logics used in AP and gives a comparison of different variants of modal logics and their target areas of application.
BibTeX:
@INPROCEEDINGS{
   author = {Pavel O{\v{c}}en{\'{a}}{\v{s}}ek and Roman
	Trchal{\'{i}}k},
   title = {Modal Logics Used for Authentication Protocols
	Analysis: Survey and Comparison},
   pages = {401--404},
   booktitle = {Proceedings of the 7th International Carpathian Control
	Conference},
   year = {2006},
   location = {Ostrava, CZ},
   publisher = {V{\v{S}}B-Technical University of Ostrava},
   ISBN = {80-248-1066-2},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php?id=8023}
}

Your IPv4 address: 54.82.119.116
Switch to https