Analysis Models for Security Protocols

In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real world, thus providing a stronger security guarantee. We provide examples both from the literature and from industrial case studies to show the practical applicability of each extension.

[1]  Paul Syverson,et al.  A formal language for cryptographic protocol requirements , 1996 .

[2]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[3]  Simon S. Lam,et al.  A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.