Downloads & Free Reading Options - Results

Modeling Adversaries In A Logic For Security Protocol Analysis by Joseph Y. Halpern

Read "Modeling Adversaries In A Logic For Security Protocol Analysis" by Joseph Y. Halpern through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1Modeling Adversaries In A Logic For Security Protocol Analysis

By

Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and decipher them with known keys. The Dolev-Yao model is a useful abstraction, but it suffers from some drawbacks: it cannot handle the adversary knowing protocol-specific information, and it cannot handle probabilistic notions, such as the adversary attempting to guess the keys. We show how we can analyze security protocols under different adversary models by using a logic with a notion of algorithmic knowledge. Roughly speaking, adversaries are assumed to use algorithms to compute their knowledge; adversary capabilities are captured by suitable restrictions on the algorithms used. We show how we can model the standard Dolev-Yao adversary in this setting, and how we can capture more general capabilities including protocol-specific knowledge and guesses.

“Modeling Adversaries In A Logic For Security Protocol Analysis” Metadata:

  • Title: ➤  Modeling Adversaries In A Logic For Security Protocol Analysis
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 16.62 Mbs, the file-s for this book were downloaded 105 times, the file-s went public at Fri Sep 20 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Modeling Adversaries In A Logic For Security Protocol Analysis at online marketplaces:


Buy “Modeling Adversaries In A Logic For Security Protocol Analysis” online:

Shop for “Modeling Adversaries In A Logic For Security Protocol Analysis” on popular online marketplaces.