Automated design of security protocols

6Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security protocols play an important role in modern communications. However, security protocol development is a delicate task, and experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimization techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without the loss of efficiency and thereby synthesize public key protocols and hybrid protocols.

References Powered by Scopus

Optimization by simulated annealing

34940Citations
N/AReaders
Get full text

Reasoning about belief in cryptographic protocols

501Citations
N/AReaders
Get full text

Prudent engineering practice for cryptographie protocols

328Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Public key cryptography using Harmony Search Algorithm

4Citations
N/AReaders
Get full text

Automated refinement of security protocols

4Citations
N/AReaders
Get full text

Nature-inspired synthesis of rational protocols

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Hao, C., Clark, J. A., & Jacob, J. L. (2004). Automated design of security protocols. Computational Intelligence, 20(3), 503–516. https://doi.org/10.1111/j.0824-7935.2004.00249.x

Readers over time

‘09‘11‘15‘1800.511.52

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

80%

Researcher 1

20%

Readers' Discipline

Tooltip

Computer Science 5

100%

Save time finding and organizing research with Mendeley

Sign up for free
0