A complete and decidable security-specialised logic and its application to the TESLA protocol.
Alessio LomuscioBozena WoznaPublished in: AAMAS (2006)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- ban logic
- security properties
- key agreement protocol
- formal analysis
- security analysis
- communication protocols
- key exchange protocol
- mobile payment
- provably secure
- rfid systems
- security model
- intrusion detection
- elliptic curve
- denial of service attacks
- diffie hellman
- access control
- electronic voting
- security policies
- key establishment
- messages exchanged
- linear time temporal logic
- virtual private network
- information security
- security services
- key distribution
- lightweight
- key management
- network security
- physical layer
- trust negotiation
- security mechanisms
- network management
- modal logic
- temporal logic
- protocol specification
- intrusion detection system
- wireless sensor networks