occurred with encryption and decryption times. More
time-consuming encryption with constant delays in
the network has made Intruder chances of deceiving
honest users higher.
REFERENCES
Alur, R. and Dill, D. L. (1994). A theory of timed automata.
Theoretical Computer Science, 126:183–235.
Basin, D. A., Cremers, C., and Meadows, C. A. (2018).
Model checking security protocols. In Handbook of
Model Checking., pages 727–762. Springer.
Bella, G. and Paulson, L. C. (1997). Using isabelle to prove
properties of the kerberos authentication system. In
In DIMACS Workshop on Design and Formal Verifi-
cation of Security Protocols.
Burrows, M., Abadi, M., and Needham, R. (1990). A
logic of authentication. ACM Trans. Comput. Syst.,
8(1):18–36.
Chadha, R., Sistla, A. P., and Viswanathan, M. (2017).
Verification of randomized security protocols. In
2017 32nd Annual ACM/IEEE Symposium on Logic
in Computer Science (LICS), pages 1–12.
Corin, R., Etalle, S., Hartel, P. H., and Mader, A. (2004).
Timed model checking of security protocols. In Pro-
ceedings of the 2004 ACM Workshop on Formal Meth-
ods in Security Engineering, FMSE ’04. ACM.
Corin, R., Etalle, S., Hartel, P. H., and Mader, A. (2007).
Timed analysis of security protocols. J. Comput. Se-
cur., 15(6).
Dolev, D. and Yao, A. C. (1981). On the security of public
key protocols. Technical report, Stanford, CA, USA.
ˇ
Cibej Uro
ˇ
s, Luka, F., and Jurij, M. (2019). A symmetry-
breaking node equivalence for pruning the search
space in backtracking algorithms. Symmetry, 11(10).
Jakubowska, G. and Penczek, W. (2007a). Is your security
protocol on time? In Proceedings of the 2007 Interna-
tional Conference on Fundamentals of Software Engi-
neering, FSEN’07, pages 65–80, Berlin, Heidelberg.
Springer-Verlag.
Jakubowska, G. and Penczek, W. (2007b). Modelling and
checking timed authentication of security protocols.
Fundam. Inform., 79(3-4):363–378.
Kurkowski, M. (2013). Formalne metody weryfikacji
własno
´
sci protokoł
´
ow zabezpieczajacych w sieci-
ach komputerowych. Informatyka - Akademicka
Oficyna Wydawnicza EXIT. Akademicka Oficyna
Wydawnicza Exit.
Needham, R. M. and Schroeder, M. D. (1978). Using en-
cryption for authentication in large networks of com-
puters. Commun. ACM, 21(12):993–999.
Nigam, V., Talcott, C. L., and Urquiza, A. A. (2016). To-
wards the automated verification of cyber-physical se-
curity protocols: Bounding the number of timed in-
truders. CoRR, abs/1605.08563.
Perh
´
a
ˇ
c, J., Bilanov
´
a, Z., Steingartner, W., and Piatko, J.
(2019). Benchmark of software developed in differ-
ent component models. In 2019 IEEE 13th Interna-
tional Symposium on Applied Computational Intelli-
gence and Informatics (SACI), pages 245–250.
Siedlecka-Lamch, O., Kurkowski, M., and Piatkowski, J.
(2016). Probabilistic model checking of security pro-
tocols without perfect cryptography assumption. In
Gaj, P., Kwiecie
´
n, A., and Stera, P., editors, Com-
puter Networks, pages 107–117, Cham. Springer In-
ternational Publishing.
Szymoniak, S. (2021). Security protocols analysis in-
cluding various time parameters. Mathematical Bio-
sciences and Engineering, 18(2):1136–1153.
Szymoniak, S., Kurkowski, M., and Piatkowski, J. (2015).
Timed models of security protocols including delays
in the network. Journal of Applied Mathematics and
Computational Mechanics, 14(3):127–139.
Szymoniak, S., Siedlecka-Lamch, O., and Kurkowski, M.
(2017). Timed Analysis of Security Protocols, pages
53–63. Springer International Publishing, Cham.
ENASE 2021 - 16th International Conference on Evaluation of Novel Approaches to Software Engineering
188