메뉴 건너뛰기




Volumn 177, Issue SUPPL. 1, 2010, Pages 51-76

To know or not to know: Epistemic approaches to security protocol verification

Author keywords

Dynamic epistemic logic; Epistemic temporal logic; Interpreted systems; Security protocols; Verification

Indexed keywords


EID: 78650513133     PISSN: 00397857     EISSN: 15730964     Source Type: Journal    
DOI: 10.1007/s11229-010-9765-8     Document Type: Article
Times cited : (21)

References (107)
  • 1
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., & Cortier, V. (2004). Deciding knowledge in security protocols under equational theories. In ICALP04, LNCS (Vol. 3142, pp. 46-58).
    • (2004) ICALP04, LNCS , vol.3142 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 2
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication. In
    • Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In POPL'01 (pp. 104-115).
    • (2001) POPL'01 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 3
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • Abadi, M., & Rogaway, P. (2002). Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2), 103-127.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 85031620050 scopus 로고
    • A semantics for a logic of authentication (extended abstract)
    • New York, NY, USA
    • Abadi, M., & Tuttle, M. R. (1991). A semantics for a logic of authentication (extended abstract). In PODC'91 (pp. 201-216). New York, NY, USA.
    • (1991) PODC'91 , pp. 201-216
    • Abadi, M.1    Tuttle, M.R.2
  • 7
    • 37149023024 scopus 로고    scopus 로고
    • Model checking on trees with path equivalences
    • Alur, R., Černý, P., & Chaudhuri, S. (2007). Model checking on trees with path equivalences. In TACAS'07, LNCS (Vol. 4424, pp. 664-678).
    • (2007) TACAS'07, LNCS , vol.4424 , pp. 664-678
    • Alur, R.1    Černý, P.2    Chaudhuri, S.3
  • 8
    • 33746373966 scopus 로고    scopus 로고
    • Preserving secrecy under refinement
    • Alur, R., Černý, P., & Zdancewic, S. (2006). Preserving secrecy under refinement. In ICALP'06, LNCS (Vol. 4052, pp. 107-118).
    • (2006) ICALP'06, LNCS , vol.4052 , pp. 107-118
    • Alur, R.1    Černý, P.2    Zdancewic, S.3
  • 9
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • In J. Leeuwen (Ed.), Chap. 26, Berlin/Heidelberg: Springer
    • Anderson, R., & Needham, R. (1995). Programming Satan's computer. In J. Leeuwen (Ed.), Computer science today, LNCS (Vol. 1000, Chap. 26, pp. 426-440). Berlin/Heidelberg: Springer.
    • (1995) Computer Science Today, LNCS , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 11
    • 84954358555 scopus 로고    scopus 로고
    • Probabilistic dynamic belief revision
    • Baltag, A., & Smets, S. (2008). Probabilistic dynamic belief revision. Synthese, 165(2), 179-202.
    • (2008) Synthese , vol.165 , Issue.2 , pp. 179-202
    • Baltag, A.1    Smets, S.2
  • 12
    • 58449096556 scopus 로고    scopus 로고
    • Knowledge-based modelling of voting protocols. In
    • Baskar, A., Ramanujam, R., & Suresh, S. P. (2007). Knowledge-based modelling of voting protocols. In TARK'07 (pp. 62-71).
    • (2007) TARK'07 , pp. 62-71
    • Baskar, A.1    Ramanujam, R.2    Suresh, S.P.3
  • 13
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • Bhargava, M., & Palamidessi, C. (2005). Probabilistic anonymity. In CONCUR'05, LNCS (Vol. 3653, pp. 171-185).
    • (2005) CONCUR'05, LNCS , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 15
    • 78650512700 scopus 로고    scopus 로고
    • Automatic verification of temporal-epistemic properties of cryptographic protocols
    • Boureanu, I., Cohen, M., & Lomuscio, A. (2009). Automatic verification of temporal-epistemic properties of cryptographic protocols. Journal of Applied Non-Classical Logics, 19(4), 463-487.
    • (2009) Journal of Applied Non-Classical Logics , vol.19 , Issue.4 , pp. 463-487
    • Boureanu, I.1    Cohen, M.2    Lomuscio, A.3
  • 16
    • 0021465083 scopus 로고
    • A theory of communicating sequential processes
    • Brookes, D., Hoare, C. A. R., & Roscoe, A. W. (1984). A theory of communicating sequential processes. Journal of the ACM, 31(3), 560-599.
    • (1984) Journal of the ACM , vol.31 , Issue.3 , pp. 560-599
    • Brookes, D.1    Hoare, C.A.R.2    Roscoe, A.W.3
  • 18
    • 70349332796 scopus 로고    scopus 로고
    • Epistemic logic for the applied pi calculus
    • Chadha, R., Delaune, S., & Kremer, S. (2009). Epistemic logic for the applied pi calculus. In FMOODS'09/FORTE'09, LNCS (Vol. 5522, pp. 182-197).
    • (2009) FMOODS'09/FORTE'09, LNCS , vol.5522 , pp. 182-197
    • Chadha, R.1    Delaune, S.2    Kremer, S.3
  • 19
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and receiver untraceability
    • Chaum, D. (1988). The dining cryptographers problem: Unconditional sender and receiver untraceability. Journal of Cryptology, 1, 65-75.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 20
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols. In
    • Chaum, D., Crépeau, C., & Damgard, I. (1988). Multiparty unconditionally secure protocols. In STOC'88 (pp. 11-19).
    • (1988) STOC'88 , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgard, I.3
  • 21
    • 69949148046 scopus 로고    scopus 로고
    • Computing knowledge in security protocols under convergent equational theories
    • Ciobâča, S., Delaune, S., & Kremer, S
    • Ciobâča, S., Delaune, S., & Kremer, S. (2009). Computing knowledge in security protocols under convergent equational theories. In CADE-22, LNCS (Vol. 5663, pp. 355-370).
    • (2009) CADE-22, LNCS , vol.5663 , pp. 355-370
  • 23
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In
    • Clarke, E. M., Jha, S., & Marrero, W. R. (1998). Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In PROCOMET'98 (pp. 87-106).
    • (1998) PROCOMET'98 , pp. 87-106
    • Clarke, E.M.1    Jha, S.2    Marrero, W.R.3
  • 24
    • 60349103014 scopus 로고    scopus 로고
    • A completeness result for BAN logic. In
    • Cohen, M., & Dam, M. (2005a). A completeness result for BAN logic. In Methods for modalities (pp. 202-219).
    • (2005) Methods For Modalities , pp. 202-219
    • Cohen, M.1    Dam, M.2
  • 25
    • 49049083577 scopus 로고    scopus 로고
    • Logical omniscience in the semantics of BAN logic. In
    • Cohen, M., & Dam, M. (2005b). Logical omniscience in the semantics of BAN logic. In FCS'05 (pp. 121-132).
    • (2005) FCS'05 , pp. 121-132
    • Cohen, M.1    Dam, M.2
  • 26
    • 78650511607 scopus 로고    scopus 로고
    • A complete axiomatization of knowledge and cryptography. In
    • Cohen, M., & Dam, M. (2007). A complete axiomatization of knowledge and cryptography. In LICS (pp. 77-88).
    • (2007) LICS , pp. 77-88
    • Cohen, M.1    Dam, M.2
  • 27
    • 84899803198 scopus 로고    scopus 로고
    • Abstraction in model checking multi-agent systems. In
    • Cohen, M., Dam, M., Lomuscio, A., & Russo, F. (2009a). Abstraction in model checking multi-agent systems. In AAMAS'09 (pp. 945-952).
    • (2009) AAMAS'09 , pp. 945-952
    • Cohen, M.1    Dam, M.2    Lomuscio, A.3    Russo, F.4
  • 28
    • 78650517677 scopus 로고    scopus 로고
    • A symmetry reduction technique for model checking temporal epistemic logic. In
    • Cohen, M., Lomuscio, A., Dam, M., & Qu, H. (2009b). A symmetry reduction technique for model checking temporal epistemic logic. In IJCAI'09 (pp. 721-726).
    • (2009) IJCAI'09 , pp. 721-726
    • Cohen, M.1    Lomuscio, A.2    Dam, M.3    Qu, H.4
  • 30
    • 38349003243 scopus 로고    scopus 로고
    • Operational and epistemic approaches to protocol analysis: Bridging the gap. In
    • Dechesne, F., Mousavi, M. R., & Orzan, S. (2007). Operational and epistemic approaches to protocol analysis: Bridging the gap. In LPAR (pp. 226-241).
    • (2007) LPAR , pp. 226-241
    • Dechesne, F.1    Mousavi, M.R.2    Orzan, S.3
  • 31
    • 52049115472 scopus 로고    scopus 로고
    • Refinement of Kripke models for dynamics
    • Dechesne, F., Orzan, S., & Wang, Y. (2008). Refinement of Kripke models for dynamics. In ICTAC'08, LNCS (Vol. 5160, pp. 111-125).
    • (2008) ICTAC'08, LNCS , vol.5160 , pp. 111-125
    • Dechesne, F.1    Orzan, S.2    Wang, Y.3
  • 33
    • 33947622187 scopus 로고    scopus 로고
    • Coercion-resistance and receipt-freeness in electronic voting. In
    • Delaune, S., Kremer, S., & Ryan, M. (2006). Coercion-resistance and receipt-freeness in electronic voting. In CSFW'06 (pp. 28-42).
    • (2006) CSFW'06 , pp. 28-42
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 34
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • Delaune, S., Kremer, S., & Ryan, M. (2009). Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 17(4), 435-487.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 38
    • 0023108525 scopus 로고
    • Uniform inevitability is tree automaton ineffable
    • Emerson, E. A. (1987). Uniform inevitability is tree automaton ineffable. Information Processing Letters, 24(2), 77-79.
    • (1987) Information Processing Letters , vol.24 , Issue.2 , pp. 77-79
    • Emerson, E.A.1
  • 39
    • 35448975120 scopus 로고    scopus 로고
    • Model checking knowledge and linear time: PSPACE cases. In
    • Engelhardt, K., Gammie, P., & van der Meyden, R. (2007). Model checking knowledge and linear time: PSPACE cases. In LFCS (pp. 195-211)
    • (2007) LFCS , pp. 195-211
    • Engelhardt, K.1    Gammie, P.2    van der Meyden, R.3
  • 40
    • 27244447948 scopus 로고    scopus 로고
    • Modal logics with a linear hierarchy of local propositional quantifiers
    • Engelhardt, K., Van Der Meyden, R., & Su, K. (2002). Modal logics with a linear hierarchy of local propositional quantifiers. In Advances in modal logic (Vol. 9, pp. 9-30).
    • (2002) Advances In Modal Logic , vol.9 , pp. 9-30
    • Engelhardt, K.1    van der Meyden, R.2    Su, K.3
  • 43
    • 0008814479 scopus 로고    scopus 로고
    • Bounds on secret key exchange using a random deal of cards
    • Fischer M. J., & Wright R. N. (1996) Bounds on secret key exchange using a random deal of cards. Journal of Cryptology, 9, 71-99
    • (1996) Journal of Cryptology , vol.9 , pp. 71-99
    • Fischer, M.J.1    Wright, R.N.2
  • 44
    • 35048815468 scopus 로고    scopus 로고
    • Classification of security properties (Part II: Network Security)
    • Springer
    • Focardi, R., Gorrieri, R., & Martinelli, F. (2004). Classification of security properties (Part II: Network Security), In LNCS (Vol. 2946, pp. 139-185). Springer.
    • (2004) LNCS , vol.2946 , pp. 139-185
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 45
    • 26944497736 scopus 로고    scopus 로고
    • MCK: Model checking the logic of knowledge
    • Springer
    • Gammie, P., & van der Meyden, R. (2004). MCK: Model checking the logic of knowledge. In CAV'04, LNCS (Vol. 3114 pp. 256-259). Springer.
    • (2004) CAV'04, LNCS , vol.3114 , pp. 256-259
    • Gammie, P.1    van der Meyden, R.2
  • 50
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • Halpern, J., & O'Neill, K. (2005). Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3), 483-514.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-514
    • Halpern, J.1    O'Neill, K.2
  • 51
    • 0000686226 scopus 로고
    • Modelling knowledge and action in distributed systems
    • Halpern, J. Y., & Fagin, R. (1989). Modelling knowledge and action in distributed systems. Distributed Computing, 3(4), 159-177.
    • (1989) Distributed Computing , vol.3 , Issue.4 , pp. 159-177
    • Halpern, J.Y.1    Fagin, R.2
  • 52
    • 0025460546 scopus 로고
    • Knowledge and common knowledge in a distributed environment
    • Halpern, J. Y., & Moses, Y. (1990). Knowledge and common knowledge in a distributed environment. Journal of the ACM, 37(3), 549-587.
    • (1990) Journal of the ACM , vol.37 , Issue.3 , pp. 549-587
    • Halpern, J.Y.1    Moses, Y.2
  • 54
    • 35248868917 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for security protocol analysis
    • Springer
    • Halpern, J. Y., & Pucella, R. (2003a). Modeling adversaries in a logic for security protocol analysis. In Formal aspects of security, LNCS (Vol. 2629, pp. 87-100). Springer.
    • (2003) Formal Aspects of Security, LNCS , vol.2629 , pp. 87-100
    • Halpern, J.Y.1    Pucella, R.2
  • 56
    • 78649738925 scopus 로고    scopus 로고
    • Dealing with logical omniscience: Expressiveness and Pragmatics
    • doi:10.1016/j.artint.2010.04.009
    • Halpern, J. Y., & Pucella, R. (2010). Dealing with logical omniscience: Expressiveness and pragmatics. Artificial Intelligence. doi:10.1016/j.artint.2010.04.009.
    • (2010) Artificial Intelligence , vol.4 , pp. 009
    • Halpern, J.Y.1    Pucella, R.2
  • 57
    • 0003015809 scopus 로고
    • The complexity of reasoning about knowledge and time. In
    • Halpern, J. Y., & Vardi, M. Y. (1986). The complexity of reasoning about knowledge and time. In STOC'86 (pp. 304-315).
    • (1986) STOC'86 , pp. 304-315
    • Halpern, J.Y.1    Vardi, M.Y.2
  • 59
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • Herzog, J. C., & Guttman, J. D. (1999). Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2-3), 191-230.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Herzog, J.C.1    Guttman, J.D.2
  • 61
    • 78650510856 scopus 로고    scopus 로고
    • Update semantics of security protocols
    • In W. van der Hoek (Ed.), Berlin: Springer
    • Hommersom, A., Meyer, J.-J., & Vink, E. (2005). Update semantics of security protocols. In W. van der Hoek (Ed.), Information, interaction and agency (pp. 289-327). Berlin: Springer.
    • (2005) Information, Interaction and Agency , pp. 289-327
    • Hommersom, A.1    Meyer, J.-J.2    Vink, E.3
  • 62
    • 67349179469 scopus 로고    scopus 로고
    • Dynamic epistemic logic with branching temporal structures
    • Hoshi, T., & Yap, A. (2009). Dynamic epistemic logic with branching temporal structures. Synthese, 169(2), 259-281.
    • (2009) Synthese , vol.169 , Issue.2 , pp. 259-281
    • Hoshi, T.1    Yap, A.2
  • 63
    • 36348951490 scopus 로고    scopus 로고
    • Belief change and cryptographic protocol verification. In
    • Hunter, A., & Delgrande, J. P. (2007). Belief change and cryptographic protocol verification. In AAAI (pp. 427-433).
    • (2007) AAAI , pp. 427-433
    • Hunter, A.1    Delgrande, J.P.2
  • 65
    • 69749087787 scopus 로고    scopus 로고
    • Receipt-freeness as a special case of anonymity in epistemic logic. In
    • Jonker, H. L., & Pieters, W. (2006). Receipt-freeness as a special case of anonymity in epistemic logic. In Workshop On trustworthy elections 2006.
    • (2006) Workshop On Trustworthy Elections , vol.2006
    • Jonker, H.L.1    Pieters, W.2
  • 68
    • 0004492731 scopus 로고
    • Monadic second order definable relations on the binary tree
    • Läuchli, H., & Savioz, C. (1987). Monadic second order definable relations on the binary tree. The Journal of Symbolic Logic, 52(1), 219-226.
    • (1987) The Journal of Symbolic Logic , vol.52 , Issue.1 , pp. 219-226
    • Läuchli, H.1    Savioz, C.2
  • 69
    • 57749179039 scopus 로고    scopus 로고
    • Symbolic model checking for temporal-epistemic logics
    • Lomuscio, A., & Penczek, W. (2007). Symbolic model checking for temporal-epistemic logics. SIGACT News, 38(3), 77-99.
    • (2007) SIGACT News , vol.38 , Issue.3 , pp. 77-99
    • Lomuscio, A.1    Penczek, W.2
  • 70
    • 70350243070 scopus 로고    scopus 로고
    • MCMAS: A model checker for the verification of multi-agent systems
    • Lomuscio, A., Qu, H., & Raimondi, F. (2009). MCMAS: A model checker for the verification of multi-agent systems. In CAV'09, LNCS (Vol. 5643, pp. 682-688).
    • (2009) CAV'09, LNCS , vol.5643 , pp. 682-688
    • Lomuscio, A.1    Qu, H.2    Raimondi, F.3
  • 71
    • 34247282764 scopus 로고    scopus 로고
    • The complexity of model checking concurrent programs against CTLK specifications. In
    • Lomuscio, A., & Raimondi, F. (2006a). The complexity of model checking concurrent programs against CTLK specifications. In AAMAS'06 (pp. 548-550).
    • (2006) AAMAS'06 , pp. 548-550
    • Lomuscio, A.1    Raimondi, F.2
  • 72
    • 33745782313 scopus 로고    scopus 로고
    • MCMAS: A model checker for multi-agent systems
    • Lomuscio, A., & Raimondi, F. (2006b). MCMAS: A model checker for multi-agent systems. In TACAS'06, LNCS (Vol. 3920, pp. 450-454).
    • (2006) TACAS'06, LNCS , vol.3920 , pp. 450-454
    • Lomuscio, A.1    Raimondi, F.2
  • 73
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • Lowe, G. (1996). Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAS'96, LNCS (Vol. 1055, pp. 147-166).
    • (1996) TACAS'96, LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 74
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 75
    • 78650512436 scopus 로고    scopus 로고
    • Available from
    • Orzan, S. (2005). LYS. Available from http://www.mobanet.nl/simona/lys/.
    • (2005) LYS
    • Orzan, S.1
  • 76
    • 85007180552 scopus 로고
    • Distributed processes and the logic of knowledge
    • Parikh, R., & Ramanujam, R. (1985). Distributed processes and the logic of knowledge. In Logic of programs, LNCS (Vol. 193, pp. 256-268).
    • (1985) Logic of Programs, LNCS , vol.193 , pp. 256-268
    • Parikh, R.1    Ramanujam, R.2
  • 78
  • 79
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6, 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 80
    • 70350645240 scopus 로고    scopus 로고
    • Perfect cryptography, S5 knowledge, and algorithmic knowledge. In
    • Petride, S., & Pucella, R. (2007). Perfect cryptography, S5 knowledge, and algorithmic knowledge. In TARK'07 (pp. 239-247).
    • (2007) TARK'07 , pp. 239-247
    • Petride, S.1    Pucella, R.2
  • 82
    • 33645745601 scopus 로고    scopus 로고
    • Deductive algorithmic knowledge
    • Pucella, R. (2006). Deductive algorithmic knowledge. Journal of Logic and Computation, 16(2), 287-309.
    • (2006) Journal of Logic and Computation , vol.16 , Issue.2 , pp. 287-309
    • Pucella, R.1
  • 83
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • Ramanujam, R., & Suresh, S. P. (2005a). Decidability of context-explicit security protocols. Journal of Computer Security, 13(1), 135-165.
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-165
    • Ramanujam, R.1    Suresh, S.P.2
  • 84
    • 32144452580 scopus 로고    scopus 로고
    • Deciding knowledge properties of security protocols. In
    • Ramanujam, R., & Suresh, S. P. (2005b). Deciding knowledge properties of security protocols. In TARK'05 (pp. 219-235).
    • (2005) TARK'05 , pp. 219-235
    • Ramanujam, R.1    Suresh, S.P.2
  • 87
    • 37149041356 scopus 로고    scopus 로고
    • Model checking knowledge and fixpoints
    • Shilov, N. V., & Garanina, N. O. (2002). Model checking knowledge and fixpoints. In FICS, BRICS notes series (Vol. NS-02-2, pp. 25-39).
    • (2002) FICS, BRICS Notes Series , vol.2 NS , pp. 25-39
    • Shilov, N.V.1    Garanina, N.O.2
  • 88
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic model checking of an anonymity system
    • Shmatikov, V. (2004). Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3/4), 355-377.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 89
    • 9444222493 scopus 로고    scopus 로고
    • Model checking temporal logics of knowledge in distributed systems. In
    • Su, K. (2004). Model checking temporal logics of knowledge in distributed systems. In AAAI (pp. 98-103).
    • (2004) AAAI , pp. 98-103
    • Su, K.1
  • 90
    • 84974755213 scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • Syverson, P. F. (1992). Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1(3-4), 317-334.
    • (1992) Journal of Computer Security , vol.1 , Issue.3-4 , pp. 317-334
    • Syverson, P.F.1
  • 92
    • 78650517588 scopus 로고    scopus 로고
    • BAN logic is not 'sound', constructing epistemic logics for security is difficult. In
    • Teepe, W. (2006). BAN logic is not 'sound', constructing epistemic logics for security is difficult. In Proceedings of FAMAS'06 (pp. 79-91).
    • (2006) Proceedings of FAMAS'06 , pp. 79-91
    • Teepe, W.1
  • 94
    • 84878170335 scopus 로고    scopus 로고
    • Merging frameworks for interaction: DEL and ETL. In
    • van Benthem, J., Gerbrandy, J., & Pacuit, E. (2007). Merging frameworks for interaction: DEL and ETL. In TARK'07 (pp. 72-81).
    • (2007) TARK'07 , pp. 72-81
    • van Benthem, J.1    Gerbrandy, J.2    Pacuit, E.3
  • 96
    • 0036355444 scopus 로고    scopus 로고
    • Tractable multiagent planning for epistemic goals. In
    • van der Hoek, W., & Wooldridge, M. (2002). Tractable multiagent planning for epistemic goals. In AAMAS'02 (pp. 1167-1174).
    • (2002) AAMAS'02 , pp. 1167-1174
    • van der Hoek, W.1    Wooldridge, M.2
  • 97
    • 84958768940 scopus 로고    scopus 로고
    • Model checking knowledge and time in systems with perfect recall
    • van der Meyden, R., & Shilov, N. (1999). Model checking knowledge and time in systems with perfect recall. In FSTTCS'99, LNCS (Vol. 1738, pp. 432-445).
    • (1999) FSTTCS'99, LNCS , vol.1738 , pp. 432-445
    • van der Meyden, R.1    Shilov, N.2
  • 98
    • 4944250729 scopus 로고    scopus 로고
    • Symbolic model checking the knowledge of the dining cryptographers. In
    • van der Meyden, R., & Su, K. (2004). Symbolic model checking the knowledge of the dining cryptographers. In CSFW'04 (pp. 280-291).
    • (2004) CSFW'04 , pp. 280-291
    • van der Meyden, R.1    Su, K.2
  • 99
    • 69249241046 scopus 로고    scopus 로고
    • Preservation of epistemic properties in security protocol implementations. In
    • van der Meyden, R., & Wilke, T. (2007). Preservation of epistemic properties in security protocol implementations. In TARK'07 (pp. 212-221).
    • (2007) TARK'07 , pp. 212-221
    • van der Meyden, R.1    Wilke, T.2
  • 100
    • 1142270378 scopus 로고    scopus 로고
    • The Russian cards problem
    • van Ditmarsch, H. (2003). The Russian cards problem. Studia Logica, 75(1), 31-62.
    • (2003) Studia Logica , vol.75 , Issue.1 , pp. 31-62
    • van Ditmarsch, H.1
  • 106
    • 70350627206 scopus 로고    scopus 로고
    • Verifying epistemic protocols under common knowledge. In
    • Wang, Y., Kuppusamy, L., & van Eijck, J. (2009). Verifying epistemic protocols under common knowledge. In TARK'09 (pp. 257-266).
    • (2009) TARK'09 , pp. 257-266
    • Wang, Y.1    Kuppusamy, L.2    van Eijck, J.3
  • 107
    • 80051558916 scopus 로고    scopus 로고
    • Logic of information flow on communication channels (extended abstract)
    • (to appear)
    • Wang, Y., Sietsma, F., & van Eijck, J. (2010). Logic of information flow on communication channels (extended abstract). In AAMAS'10 (to appear).
    • (2010) AAMAS'10
    • Wang, Y.1    Sietsma, F.2    van Eijck, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.