메뉴 건너뛰기




Volumn 36, Issue , 2000, Pages 229-234

Applications of term rewriting to cryptographic protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE DESCRIPTION LANGUAGES; FORMAL LOGIC; INTERNET; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 0009926726     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(05)80142-2     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 4
    • 14844343148 scopus 로고    scopus 로고
    • Design of a GIL connector to Maude
    • V.H.N. Heintze, & E. Clarke. Carnegie Mellon University
    • Denker G. Design of a GIL connector to Maude. Heintze V.H.N., Clarke E. Workshop on Formal Methods and Comuter Security. July 2000;Carnegie Mellon University
    • (2000) Workshop on Formal Methods and Comuter Security
    • Denker, G.1
  • 8
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TAG AS Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TAG AS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 9
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe G. Towards a completeness result for model checking of security protocols. Journal of Computer Security. 7:(2/3):1999;89-146
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L. The inductive approach to verifying cryptographic protocols. Journal of Computer Security. 6:(1):1998;85-128
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.