Yongyuth Permpoontanalarp

Learn More
Many model checking methods have been developed and applied to analyze cryptographic protocols. Most of them can analyze only one attack trace of a found attack. In this paper, we propose a very simple but practical model checking methodology for the analysis of cryptographic protocols. Our methodology offers an efficient analysis of all attack traces for(More)
Over the past few years, several different approaches have been proposed to deal with multi-agent autoepistemic reasoning. Despite some limitations, each approach is important in its own right. While Pafikh's approach allows an agent to reason uonmonotonically about other agents' knowledge, it cannot reason about other agents' nonmonotonic reasoning.(More)
Firewalls offer a protection for private networks against external attacks. However, configuring firewalls correctly is a difficult task. There are two main reasons. One is that the effects of a firewall configuration cannot be easily seen during the configuration time. Another one is the lack of guidance to help configuring firewalls. In this paper, we(More)