메뉴 건너뛰기




Volumn 7, Issue 1-2, 1996, Pages 27-59

A formal language for cryptographic protocol requirements

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0001937830     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/BF00125075     Document Type: Article
Times cited : (35)

References (30)
  • 3
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications, Vol. 1, No. 1 (1994) pp. 25-31.
    • (1994) IEEE Personal Communications , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 4
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • volume to appear, Springer-Verlag
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, Advances in Cryptology - CRYPTO '93, volume to appear, Springer-Verlag (1994).
    • (1994) Advances in Cryptology - CRYPTO '93
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 85016462400 scopus 로고
    • Systematic design of two-party authentication protocols
    • Advances in Cryptology - CRYPTO '91, (Joan Feigenbaum, ed.), Springer Verlag, Berlin
    • Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung, Systematic design of two-party authentication protocols, Advances in Cryptology - CRYPTO '91, (Joan Feigenbaum, ed.), Lecture Notes in Computer Science, Springer Verlag, Berlin, 572 (1992).
    • (1992) Lecture Notes in Computer Science , vol.572
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 6
    • 0025388480 scopus 로고
    • A security scheme for resource sharing over a network
    • J. Burns and C.J. Mitchell, A security scheme for resource sharing over a network, Computers and Security, Vol. 9 (1990) pp. 67-76.
    • (1990) Computers and Security , vol.9 , pp. 67-76
    • Burns, J.1    Mitchell, C.J.2
  • 7
    • 0025386404 scopus 로고
    • A Logic of Authentication
    • Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
    • Michael Burrows, Martín Abadi, and Roger Needham, A Logic of Authentication, Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, Vol. 8, No. 1 (1990) pp. 18-36. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 9
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • (S. Goldwasser, ed.), Springer-Verlag, LNCS 403
    • D. Chaum, A. Fiat, and M. Naor, Untraceable electronic cash, Advances in Cryptology - CRYPTO '88, (S. Goldwasser, ed.), Springer-Verlag, LNCS 403 (1990) pp. 319-327.
    • (1990) Advances in Cryptology - CRYPTO '88 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 12
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, Vol. 29, No. 2 (1983) pp. 198-208.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 13
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • Taher ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31, No. 4 (1985) pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 14
    • 0003198753 scopus 로고
    • Logics of Time and Computation
    • nd edition, CSLI Publications, Stanford
    • nd edition, CSLI Lecture Notes, CSLI Publications, Stanford, 7 (1992).
    • (1992) CSLI Lecture Notes , vol.7
    • Goldblatt, R.1
  • 15
    • 0037643821 scopus 로고
    • Research Report 57, Digital systems research Center, April
    • Leslie Lamport, A Temporal Logic of Action, Research Report 57, Digital systems research Center, (April 1990).
    • (1990) A Temporal Logic of Action
    • Lamport, L.1
  • 16
  • 17
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows, Applying formal methods to the analysis of a key management protocol, Journal of Computer Security, Vol. 1 (1992) pp. 5-53.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 18
    • 0004256761 scopus 로고
    • Ph.d. thesis, Georgia Institute of Technology
    • M. J. Merritt, Cryptographic Protocols, Ph.d. thesis, Georgia Institute of Technology (1983).
    • (1983) Cryptographic Protocols
    • Merritt, M.J.1
  • 20
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • D. M. Nessett, A critique of the Burrows, Abadi, and Needham logic, Operating Systems Review, Vol. 24, No. 2 (1990) pp. 35-38.
    • (1990) Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 23
    • 1442341305 scopus 로고
    • Formal requirements for key distribution protocols
    • University of Perugia, Italy, Final proceedings forthcoming from Springer-Verlag
    • Paul Syverson and Catherine Meadows, Formal requirements for key distribution protocols, Pre-proceedings of EUROCRYPT '94, University of Perugia, Italy, (1994) pp. 325-337. Final proceedings forthcoming from Springer-Verlag.
    • (1994) Pre-proceedings of EUROCRYPT '94 , pp. 325-337
    • Syverson, P.1    Meadows, C.2
  • 26
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • Paul F. Syverson, On key distribution protocols for repeated authentication, Operating Systems Review, Vol. 27, No. 4 (1993) pp. 24-30.
    • (1993) Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.F.1
  • 27
    • 0003537268 scopus 로고
    • Separating the specification and implementation phases in cryptology
    • Springer-Verlag LMCS 638
    • M.-J. Toussaint, Separating the specification and implementation phases in cryptology, Computer Security - ESORICS 92, Springer-Verlag LMCS 638 (1992) pp. 77-102.
    • (1992) Computer Security - ESORICS 92 , pp. 77-102
    • Toussaint, M.-J.1
  • 28
    • 26044450915 scopus 로고
    • The Logic of Time
    • Kluwer Academic Publishers, Dordrecht, The Netherlands, second edition
    • Johan van Bentham, The Logic of Time, Synthese Library, Vol. 156, Kluwer Academic Publishers, Dordrecht, The Netherlands, second edition, (1991).
    • (1991) Synthese Library , vol.156
    • Van Bentham, J.1
  • 30
    • 84974746841 scopus 로고
    • Optimality of asynchronous two-party secure data-exchange protocols
    • R. Yahalom, Optimality of asynchronous two-party secure data-exchange protocols, Journal of Computer Security, Vol. 2, No. 2-3 (1994) pp. 191-209.
    • (1994) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 191-209
    • Yahalom, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.