The formal verification of security properties of a cryptographic protocol is a difficult, albeit very important task as more and more sensible resources are added to public networks. This paper is focused on model checking; when adopting this approach to the problem, one challenge is to represent the intruder's knowledge in an effective way. We present an intruder's knowledge representation strategy that supports the full term language of spi calculus and does not pose artificial restrictions, such as atomicity or limited maximum size, to language elements. In addition, our approach leads to practical implementation because the knowledge representation is incrementally computable and is easily amenable to work with various term representation languages. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Cibrario B., I., Durante, L., Sisto, R., & Valenzano, A. (2003). A new knowledge representation strategy for cryptographic protocol analysis. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2619, 284–298. https://doi.org/10.1007/3-540-36577-x_21
Mendeley helps you to discover research relevant for your work.