Security Proof of KerNeeS Protocol Based on Logic of Events.
Ke YangMeihua XiaoJia ChenPublished in: NCTCS (2018)
Keyphrases
- contractual obligations
- cryptographic protocols
- security protocols
- proof theory
- key agreement protocol
- authentication protocol
- natural deduction
- ban logic
- event detection
- linear logic
- formal analysis
- security analysis
- key exchange protocol
- rfid systems
- security model
- denial of service attacks
- mobile payment
- electronic voting
- security properties
- sequent calculi
- modal logic
- key distribution
- mutual authentication
- cut elimination
- formal proof
- provably secure
- theorem prover
- proof theoretic
- logical rules
- communication protocols
- security issues
- proof search
- key establishment
- logic programming
- automated theorem proving
- access control
- security requirements
- lightweight
- intrusion detection
- sequent calculus
- secure routing
- security mechanisms
- complete axiomatization
- homomorphic encryption
- key agreement
- information security
- key exchange
- secure multiparty computation
- protocol specification
- messages exchanged
- theorem proving
- trust negotiation
- security policies
- network layer
- physical layer
- security services
- mobile agent system
- network security
- smart card
- inference rules
- trusted third party