By the same authors

From the same journal

Protocols are programs too: the meta-heuristic search for security protocols

Research output: Contribution to journalArticle



Publication details

JournalInformation and Software Technology
DatePublished - 15 Dec 2001
Issue number14
Number of pages14
Pages (from-to)891-904
Original languageEnglish


Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. The belief logic of Burrows, Abadi and Needham BAN logic) is viewed as both a specification and proof system and as a 'protocol programming language'. The paper shows how simulated annealing and genetic algorithms can be used to generate correct and efficient BAN protocols. It also investigates the use of parsimonious and redundant representations. (C) 2001 Elsevier Science B.V. All rights reserved.

    Research areas

  • secure protocols, belief logic, simulated annealing, genetic algorithms

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations