A. Sherman, Erin Lanus, Moses D. Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, C. Bonyadi, Mario Yaksetig, Ian Blumenfeld
Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S. Department of Defense under CySP Capacity grants H98230-17-1-0387 and H98230-18-1-0321. Sherman, Golaszewski, Wnuk-Fink, Bonyadi, and the UMBC Cyber Defense Lab were supported also in part by the National Science Foundation under SFS grant DGE-1753681.
{"title":"Formal Methods Analysis of the Secure Remote Password Protocol","authors":"A. Sherman, Erin Lanus, Moses D. Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, C. Bonyadi, Mario Yaksetig, Ian Blumenfeld","doi":"10.13016/M2QMYH-LFRY","DOIUrl":"https://doi.org/10.13016/M2QMYH-LFRY","url":null,"abstract":"Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S. Department of Defense under CySP Capacity grants H98230-17-1-0387 and H98230-18-1-0321. Sherman, Golaszewski, Wnuk-Fink, Bonyadi, and the UMBC Cyber Defense Lab were supported also in part by the National Science Foundation under SFS grant DGE-1753681.","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-09DOI: 10.1007/978-3-030-62077-6_10
Vincent Cheval, S. Kremer, Itsaka Rakotonirina
{"title":"The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols","authors":"Vincent Cheval, S. Kremer, Itsaka Rakotonirina","doi":"10.1007/978-3-030-62077-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_10","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-62077-6_5
Tajana Ban Kirigin, Benedikt Perak
{"title":"There's No Time, The Problem of Conceptualising Time","authors":"Tajana Ban Kirigin, Benedikt Perak","doi":"10.1007/978-3-030-62077-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_5","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-62077-6_7
Maria Ribeiro, P. Adão, P. Mateus
{"title":"Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL","authors":"Maria Ribeiro, P. Adão, P. Mateus","doi":"10.1007/978-3-030-62077-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_7","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"54 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-62077-6_11
Paul D. Rowe, J. Guttman, John D. Ramsdell
{"title":"Assumption-Based Analysis of Distance-Bounding Protocols with cpsa","authors":"Paul D. Rowe, J. Guttman, John D. Ramsdell","doi":"10.1007/978-3-030-62077-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_11","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-62077-6
Tajana Ban Kirigin, C. Talcott, J. Guttman, S. Kuznetsov, B. T. Loo, M. Okada
{"title":"Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday","authors":"Tajana Ban Kirigin, C. Talcott, J. Guttman, S. Kuznetsov, B. T. Loo, M. Okada","doi":"10.1007/978-3-030-62077-6","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-62077-6_8
Z. Šikić, S. Ghilezan, Z. Ognjanovic, T. Studer
{"title":"Logic and Applications - LAP Meeting","authors":"Z. Šikić, S. Ghilezan, Z. Ognjanovic, T. Studer","doi":"10.1007/978-3-030-62077-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-62077-6_8","url":null,"abstract":"","PeriodicalId":344056,"journal":{"name":"Logic, Language, and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}