Publication result detail

The Use of Modal Logics in the Security Protocols Analysis

OČENÁŠEK, P.; TRCHALÍK, R.

Original Title

The Use of Modal Logics in the Security Protocols Analysis

English Title

The Use of Modal Logics in the Security Protocols Analysis

Type

Paper in proceedings outside WoS and Scopus

Original Abstract

Traditionally, security protocols have beendesigned and verified using various techniques. Formal logics have been used toidentify a number of flaws in protocols previously considered to be secure. Theselection of proper modal logic is a crucial goal in the protocol analysisprocess. This paper gives a comparative study of modal logics, which are widelyused in modeling of security protocols.

English abstract

Traditionally, security protocols have beendesigned and verified using various techniques. Formal logics have been used toidentify a number of flaws in protocols previously considered to be secure. Theselection of proper modal logic is a crucial goal in the protocol analysisprocess. This paper gives a comparative study of modal logics, which are widelyused in modeling of security protocols.

Keywords

Modal Logic, Security Protocol, Analysis

Key words in English

Modal Logic, Security Protocol, Analysis

Authors

OČENÁŠEK, P.; TRCHALÍK, R.

Released

27.04.2006

Publisher

Faculty of Electrical Engineering and Communication BUT

Location

Brno

ISBN

80-214-3163-6

Book

Proceedings of the 12th Conference STUDENT EEICT 2006

Pages from

395

Pages to

399

Pages count

5

BibTex

@inproceedings{BUT22192,
  author="Pavel {Očenášek} and Roman {Trchalík}",
  title="The Use of Modal Logics in the Security Protocols Analysis",
  booktitle="Proceedings of the 12th Conference STUDENT EEICT 2006",
  year="2006",
  pages="395--399",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  address="Brno",
  isbn="80-214-3163-6"
}