Analysis of Security Protocols

Thesis

  • N.A.Durgin, Logical Analysis and Complexity of Security Protocols, March 2003
  • Journal Publications

  • I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, A Comparison Between Strand Spaces and Multiset Rewriting for Security Protocol Analysis, Journal of Computer Security 13(2005) 265-316.
  • N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, Multiset Rewriting and the Complexity of Bounded Security Protocols, Journal of Computer Security 12(2004) 247-311.
  • N.A. Durgin, J.C. Mitchell,  D. Pavlovic, A compositional logic for proving security properties of protocols., Journal of Computer Security 11(2003) 677-721.
  • Conference Publications

  • Durgin, N., Mai, Y., Van Randwyk, J., NetState: A Network Version Tracking System, Proceedings of Freenix/Open Source Track 2005 USENIX Annual Technical Conference, Anaheim, CA, April 10-15, 2005, pages 119-127.
  • Durgin, N., Mitchell, J., Pavlovic, D., A compositional logic for protocol correctness, 14-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 11-13, 2001. (Abstract, Bibtex, Paper)
  • Cervesato, I., Durgin, N, Kanovich, M., Scedrov, A., Interpreting strands in linear logic, 2000 Workshop on Formal Methods and Computer Security, Chicago, Ill, July 20, 2000. (Abstract, Bibtex, Paper)
  • Cervesato, I., Durgin, N.A., Mitchell, J.C., Lincoln, P.D., and Scedrov, A., Relating strands and multiset rewriting for security protocol analysis, 13-th IEEE Computer Security Foundations Workshop, Cambridge, U.K., July 3-5, 2000, pages 35-51. (Abstract, Bibtex, Paper)
  • Cervesato,I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., and Scedrov, A., A meta-notation for protocol analysis, 12-th IEEE Computer Security Foundations Workshop, Mordano, Italy, June 28-30, 1999. (Abstract, Bibtex, Paper)
  • Durgin, N.A., Lincoln, P.D., Mitchell, J.C., and Scedrov, A., Undecidability of bounded security protocols, Workshop on Formal Methods and Security Protocols (FMSP'99), Trento, Italy, July 5, 1999. Electronic proceedings
  • Durgin, N.A. and Mitchell, J.C., Analysis of Security Protocols. In Calculational System Design, ed. M. Broy and R. Steinbruggen, IOS Press, 1999, pages 369--395. (Abstract, Bibtex, Paper)
  • Technical Reports

  • Durgin, N.A., Zhang, P. C., Profile-based Adaptive Anomaly Detection for Network Security, Sandia National Laboratories Technical Report, November 2005, SAND2005-7293.
  • Durgin, N.A., Rogers, D.T.K., Mathematical Analysis of Deception, Sandia National Laboratories Technical Report, October 2003, SAND2003-8601.