메뉴 건너뛰기




Volumn 22, Issue 1, 1996, Pages 16-30

A model for secure protocols and their compositions

Author keywords

Authentication; Clocks; communication; Composition; Computer security; Cryptography; Formal methods; Logic of authentication; Model; Model checking; Protocol analysis; Protocols

Indexed keywords


EID: 0001924088     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.481514     Document Type: Article
Times cited : (48)

References (24)
  • 6
    • 0011248691 scopus 로고    scopus 로고
    • "An efficient probabilistic public-key encryption scheme which hides all partial information,"
    • 84, Springer-Verlag LNCS no. 196, 1984.
    • M. Blum and S. Goldwasser, "An efficient probabilistic public-key encryption scheme which hides all partial information," Advances in Cryptology: Proc. o/CKYPTO'84, Springer-Verlag LNCS no. 196, 1984.
    • Advances in Cryptology: Proc. O/CKYPTO'
    • Blum, M.1    Goldwasser, S.2
  • 8
    • 0002367651 scopus 로고    scopus 로고
    • "Synthesis of synchronization skeletons for branching time temporal logic,"
    • vol. 131. Yorktown Heights, N. Y: Springer-Verlag, May 1981.
    • E.M. Clarke and E.A. Emerson "Synthesis of synchronization skeletons for branching time temporal logic," Logic of Programs: Workshop, Lecture notes in Computer Science, vol. 131. Yorktown Heights, N. Y: Springer-Verlag, May 1981.
    • Logic of Programs: Workshop, Lecture Notes in Computer Science
    • Clarke, E.M.1    Emerson, E.A.2
  • 9
    • 0022706656 scopus 로고    scopus 로고
    • "Automatic verification of finite-state concurrent systems using temporal logic specifications,"
    • vol. 8, no. 2, pp. 244-263,1986.
    • E.M. Clarke, E.A. Emerson, and A.P. Sistla, "Automatic verification of finite-state concurrent systems using temporal logic specifications," ACM Trans. Programming Languages and Systems, vol. 8, no. 2, pp. 244-263,1986.
    • ACM Trans. Programming Languages and Systems
    • Clarke, E.M.1    Emerson, E.A.2    Sistla, A.P.3
  • 11
    • 0025386404 scopus 로고    scopus 로고
    • "A logic of authentication,"
    • vol. 8, no. 1, pp. 18-36, Feb. 1990. Also see Research Report no. 39, DEC SRC, 48 pp., 1989.
    • M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-36, Feb. 1990. Also see Research Report no. 39, DEC SRC, 48 pp., 1989.
    • ACM Trans. Computer Systems
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 12
    • 0020720357 scopus 로고    scopus 로고
    • "On the security of public key protocols,"
    • vol. 29, no. 2, Mar. 1983. Also appears in the 22nd FOCS, 1981.
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Information Theory, vol. 29, no. 2, Mar. 1983. Also appears in the 22nd FOCS, 1981.
    • IEEE Trans. Information Theory
    • Dolev, D.1    Yao, A.C.2
  • 13
    • 0020889144 scopus 로고    scopus 로고
    • "On the security of multi-party pingpong protocols,"
    • 24th IEEE Symp. Foundation of Computer Science, pp. 34-39, Oct. 1983.
    • S. Even and O. Goldreich, "On the security of multi-party pingpong protocols," Proc. 24th IEEE Symp. Foundation of Computer Science, pp. 34-39, Oct. 1983.
    • Proc.
    • Even, S.1    Goldreich, O.2
  • 14
    • 85050160774 scopus 로고    scopus 로고
    • "Probabilistic encryption and how to play mental poker keeping secret all private information,"
    • 14th ACM Symp. Theory of Computing, 1982.
    • S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all private information," Proc. 14th ACM Symp. Theory of Computing, 1982.
    • Proc.
    • Goldwasser, S.1    Micali, S.2
  • 16
    • 0020127727 scopus 로고    scopus 로고
    • "A key management scheme for end-to-end encryption and a formal verification of its security,"
    • vol. 13, pp. 59-69,1982.
    • T. Kasami, S. Yamamura, and K. Mori, "A key management scheme for end-to-end encryption and a formal verification of its security," Systems, Computers, Control, vol. 13, pp. 59-69,1982.
    • Systems, Computers, Control
    • Kasami, T.1    Yamamura, S.2    Mori, K.3
  • 17
    • 0017996760 scopus 로고    scopus 로고
    • "Time, clocks and the ordering of events in a distributed system,"
    • vol. 21, no. 7, pp. 558-565, July 1978.
    • L. Lamport, "Time, clocks and the ordering of events in a distributed system," Comm. ACM, vol. 21, no. 7, pp. 558-565, July 1978.
    • Comm. ACM
    • Lamport, L.1
  • 19
    • 0342880800 scopus 로고    scopus 로고
    • "Applying formal methods to the analysis of key management protocol,"
    • vol. 1, pp. 5-53,1992.
    • C.A. Meadows, "Applying formal methods to the analysis of key management protocol," J. Computer Security, vol. 1, pp. 5-53,1992.
    • J. Computer Security
    • Meadows, C.A.1
  • 21
    • 0023247970 scopus 로고    scopus 로고
    • "Efficient and timely mutual authentication,"
    • vol. 21, no. 1, pp. 8-10, Jan. 1987.
    • D. Otway and O. Rees, "Efficient and timely mutual authentication," Operating Systems Review, vol. 21, no. 1, pp. 8-10, Jan. 1987.
    • Operating Systems Review
    • Otway, D.1    Rees, O.2
  • 22
    • 0027227136 scopus 로고    scopus 로고
    • "A logical language for specifying cryptographic protocol requirements,"
    • 1993 IEEE Symp. Research in Security and Privacy, May 1993.
    • P. Syverson and C. Meadows, "A logical language for specifying cryptographic protocol requirements," Proc. 1993 IEEE Symp. Research in Security and Privacy, May 1993.
    • Proc.
    • Syverson, P.1    Meadows, C.2
  • 23
    • 0012009804 scopus 로고    scopus 로고
    • "The use of logic in the analysis of cryptographic protocols,"
    • 1991 IEEE Symp. Research in Security and Privacy, May 1991.
    • P. Syverson, "The use of logic in the analysis of cryptographic protocols," Proc. 1991 IEEE Symp. Research in Security and Privacy, May 1991.
    • Proc.
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.