Logic, Language, and Security最新文献

筛选
英文 中文
Formal Methods Analysis of the Secure Remote Password Protocol 安全远程密码协议的形式化方法分析
Logic, Language, and Security Pub Date : 2020-03-16 DOI: 10.13016/M2QMYH-LFRY
A. Sherman, Erin Lanus, Moses D. Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, C. Bonyadi, Mario Yaksetig, Ian Blumenfeld
{"title":"Formal Methods Analysis of the Secure Remote Password Protocol","authors":"A. Sherman, Erin Lanus, Moses D. Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, C. Bonyadi, Mario Yaksetig, Ian Blumenfeld","doi":"10.13016/M2QMYH-LFRY","DOIUrl":"https://doi.org/10.13016/M2QMYH-LFRY","url":null,"abstract":"Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S. Department of Defense under CySP Capacity grants H98230-17-1-0387 and H98230-18-1-0321. Sherman, Golaszewski, Wnuk-Fink, Bonyadi, and the UMBC Cyber Defense Lab were supported also in part by the National Science Foundation under SFS grant DGE-1753681.","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols 安全协议中等价性质的可判定性和复杂性的搭便车指南
Logic, Language, and Security Pub Date : 2020-03-09 DOI: 10.1007/978-3-030-62077-6_10
Vincent Cheval, S. Kremer, Itsaka Rakotonirina
{"title":"The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols","authors":"Vincent Cheval, S. Kremer, Itsaka Rakotonirina","doi":"10.1007/978-3-030-62077-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_10","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
There's No Time, The Problem of Conceptualising Time 没有时间,概念化时间的问题
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_5
Tajana Ban Kirigin, Benedikt Perak
{"title":"There's No Time, The Problem of Conceptualising Time","authors":"Tajana Ban Kirigin, Benedikt Perak","doi":"10.1007/978-3-030-62077-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_5","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelchecking Safety Properties in Randomized Security Protocols 随机化安全协议中安全属性的模型检查
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_12
Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan
{"title":"Modelchecking Safety Properties in Randomized Security Protocols","authors":"Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan","doi":"10.1007/978-3-030-62077-6_12","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_12","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Andre Scedrov Andre Scedrov
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_13
G. Morrill
{"title":"Andre Scedrov","authors":"G. Morrill","doi":"10.1007/978-3-030-62077-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_13","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL 使用Isabelle/HOL的以太坊智能合约的正式验证
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_7
Maria Ribeiro, P. Adão, P. Mateus
{"title":"Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL","authors":"Maria Ribeiro, P. Adão, P. Mateus","doi":"10.1007/978-3-030-62077-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_7","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"54 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Transcendental Syntax iv: Logic Without Systems 先验语法iv:没有系统的逻辑
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_2
J. Girard
{"title":"Transcendental Syntax iv: Logic Without Systems","authors":"J. Girard","doi":"10.1007/978-3-030-62077-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_2","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131114221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assumption-Based Analysis of Distance-Bounding Protocols with cpsa 基于假设的cpsa距离边界协议分析
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_11
Paul D. Rowe, J. Guttman, John D. Ramsdell
{"title":"Assumption-Based Analysis of Distance-Bounding Protocols with cpsa","authors":"Paul D. Rowe, J. Guttman, John D. Ramsdell","doi":"10.1007/978-3-030-62077-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_11","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday 逻辑、语言与安全:献给安德烈·谢罗夫65岁生日的随笔
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6
Tajana Ban Kirigin, C. Talcott, J. Guttman, S. Kuznetsov, B. T. Loo, M. Okada
{"title":"Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday","authors":"Tajana Ban Kirigin, C. Talcott, J. Guttman, S. Kuznetsov, B. T. Loo, M. Okada","doi":"10.1007/978-3-030-62077-6","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Logic and Applications - LAP Meeting 逻辑和应用- LAP会议
Logic, Language, and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-62077-6_8
Z. Šikić, S. Ghilezan, Z. Ognjanovic, T. Studer
{"title":"Logic and Applications - LAP Meeting","authors":"Z. Šikić, S. Ghilezan, Z. Ognjanovic, T. Studer","doi":"10.1007/978-3-030-62077-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_8","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信