A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. ... We define a translation from CAPSL models into interpreted systems, a popular semantics for temporal-epistemic logic, and rewrite CAPSL goals as temporal-epistemic specifications. ... ., 2008) , where a framework for specifying security protocols as interpreted systems was described. ...doi:10.3166/jancl.19.463-487 fatcat:3d64n7sqjfa73gqccmfaw3juwq
We model check several attack-prone protocols against their detectability specifications. ... Based on this relation, we introduce a knowledge modality and an algorithm to model check multiagent systems against it. These techniques are applied to verify e-voting protocols. ... The authors use a bounded model checking framework to verify security protocols specified as interpreted systems specialised with security-related features. ...doi:10.25560/6391 fatcat:gd5o7kzoabcqhax5efk7ofxgoa