Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,290 papers from all fields of science
Search
Sign In
Create Free Account
Protocol composition logic
Protocol Composition Logic is a formal method that is used for proving security properties of protocols that use symmetric key and Public key…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cryptographic protocol
Digital signature
Process calculus
Public-key cryptography
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A new method of formalizing anonymity based on protocol composition logic
Tao Feng
,
Shining Han
,
Xian Guo
,
Donglin Ma
Secur. Commun. Networks
2015
Corpus ID: 2013059
In order to make protocol composition logic PCL model satisfy the special needs of anonymous analysis, based on observational…
Expand
2013
2013
Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL)
R. Singh
,
T. P. Sharma
2013
Corpus ID: 5900168
Authentication is one of the essential tools available for security in WLANs. Access control authentication mechanisms provides…
Expand
2012
2012
Secure Re-authentication Scheme for 3G-WLAN Integrating Network Based on Protocol Composition Logic
Tao Feng
,
Hui Chen
,
Jianfeng Ma
International Conference on Computer Science and…
2012
Corpus ID: 15342647
The new re-authentication protocol named SFR is proposed to make up for lack of authentication to access network in existing re…
Expand
2011
2011
Protocol Derivation System for the Needham-Schroeder family
Junwei Zhang
,
Jianfeng Ma
,
Chao Yang
International ICST Conference on Communications…
2011
Corpus ID: 15056388
A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by…
Expand
2011
2011
Secure authenticated key agreement protocol for WMEN based on protocol composition logic
Tao Feng
,
Yang Yi
,
Jianfeng Ma
IEEE International Conference on Communication…
2011
Corpus ID: 14264880
This paper formally analyzes the WMEN authenticated key agreement scheme SKE using protocol composition logic (PCL) and detects…
Expand
2010
2010
Extension and application of protocol composition logic
Ziyi You
,
Juntao Li
,
Xiaoyao Xie
International Conference on Computer Engineering…
2010
Corpus ID: 11700879
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric…
Expand
2010
2010
Formal analysis of improved EAP-AKA based on Protocol Composition Logic
Peng Liu
,
Peng Zhou
International Conference on Future Computer and…
2010
Corpus ID: 16716398
A formal analysis based on PCL (Protocol Composition Logic) points out the vulnerability during the composition of EAP-AKA, and…
Expand
2009
2009
An Automated Approach for Proving PCL Invariants
John C. Mitchell
,
Arnab Roy
,
Mukund Sundararajan
SecReT@LICS/CSF
2009
Corpus ID: 2423441
2008
2008
Study of Protocol Composition Logic
Chang Qing-mei
2008
Corpus ID: 58244439
The syntax,semantic and proof system of Protocol Composition Logic(PCL) are explicated.The ways of proof about authentication…
Expand
2005
2005
Validation of the ASW Contract Signing Protocol
Mathieu Turuani
,
H. Vu-Van
2005
Corpus ID: 64618794
We consider the verification of contract signing protocol within a useful logical formalism, called the Protocol Composition…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE