Analysis of Security Protocols
Thesis
N.A.Durgin,
Logical Analysis and Complexity of Security Protocols,
March 2003
Journal Publications
I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell,
A. Scedrov, A
Comparison Between Strand Spaces and Multiset Rewriting for Security
Protocol Analysis, Journal of Computer Security 13(2005)
265-316.
N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, Multiset Rewriting and the Complexity of
Bounded Security Protocols, Journal of Computer Security
12(2004) 247-311.
N.A. Durgin, J.C. Mitchell, D. Pavlovic, A compositional logic for proving security
properties of protocols., Journal of Computer Security 11(2003) 677-721.
Conference Publications
Durgin, N., Mai, Y., Van Randwyk, J.,
NetState: A Network Version Tracking System,
Proceedings of Freenix/Open Source Track 2005 USENIX Annual Technical
Conference, Anaheim, CA, April 10-15, 2005, pages 119-127.
Durgin, N., Mitchell, J., Pavlovic, D.,
A compositional logic for protocol correctness,
14-th IEEE Computer Security Foundations Workshop,
Cape Breton, Nova Scotia, June 11-13, 2001.
(Abstract, Bibtex, Paper)
Cervesato, I., Durgin, N, Kanovich, M., Scedrov, A., Interpreting
strands in linear logic, 2000 Workshop on Formal Methods and Computer
Security, Chicago, Ill, July 20, 2000.
(Abstract, Bibtex, Paper)
Cervesato, I., Durgin, N.A., Mitchell, J.C., Lincoln, P.D., and Scedrov, A.,
Relating strands and multiset rewriting for security protocol analysis,
13-th IEEE Computer Security Foundations Workshop,
Cambridge, U.K., July 3-5, 2000, pages 35-51.
(Abstract, Bibtex, Paper)
Cervesato,I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., and Scedrov, A.,
A meta-notation for protocol analysis,
12-th IEEE Computer Security Foundations Workshop, Mordano, Italy,
June 28-30, 1999.
(Abstract, Bibtex, Paper)
Durgin, N.A., Lincoln, P.D., Mitchell, J.C., and Scedrov, A.,
Undecidability of bounded security protocols, Workshop on Formal Methods
and Security Protocols (FMSP'99), Trento, Italy, July 5, 1999. Electronic
proceedings
Durgin, N.A. and Mitchell, J.C.,
Analysis of Security Protocols.
In Calculational System Design, ed. M. Broy and R. Steinbruggen, IOS Press,
1999, pages 369--395.
(Abstract, Bibtex, Paper)
Technical Reports
Durgin, N.A., Zhang, P. C.,
Profile-based Adaptive Anomaly Detection for Network Security, Sandia National
Laboratories Technical Report, November 2005, SAND2005-7293.
Durgin, N.A., Rogers, D.T.K.,
Mathematical Analysis of Deception, Sandia National Laboratories Technical Report,
October 2003, SAND2003-8601.