메뉴 건너뛰기




Volumn 36, Issue , 2000, Pages 235-256

Maude versus Haskell: An experimental comparison in security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PROGRAMMING LANGUAGES; FORMAL LOGIC; HEURISTIC METHODS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; OBJECT ORIENTED PROGRAMMING;

EID: 0009956081     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(05)80141-0     Document Type: Conference Paper
Times cited : (15)

References (33)
  • 14
    • 0039492084 scopus 로고
    • Higher-order functions considered unnecessary for higher-order programming
    • D.A. Turner. Massachusetts: Addison-Wesley
    • Goguen J. Higher-order functions considered unnecessary for higher-order programming. Turner D.A. Research Topics in Functional Programming. 1990;Addison-Wesley, Massachusetts
    • (1990) Research Topics in Functional Programming
    • Goguen, J.1
  • 17
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TAG AS Springer-Verlag
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In Proceedings of TAG AS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 18
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A Compiler for the Analysis of Security Protocols
    • Lowe G. Casper: A Compiler For the Analysis of Security Protocols. Journal of Computer Security. 6:(1):1998;53-84
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 20
    • 18944393059 scopus 로고    scopus 로고
    • Maude Web Site. http://maude.csl.sri.com/. 2000
    • (2000)
    • Web Site, M.1
  • 22
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • Meadows C. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming. 26:(2):1996;113-131
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 23
    • 0027113376 scopus 로고
    • Conditional Rewriting Logic as a Unified Model of Concurrency
    • Meseguer J. Conditional Rewriting Logic as a Unified Model of Concurrency. Theoretical Comput. Sci. 96:(1):1992;73-155
    • (1992) Theoretical Comput. Sci , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 25
    • 84955586238 scopus 로고    scopus 로고
    • Rewriting logic as a semantic framework for soncurrency: A progress report
    • U. Montanari and V. Sassone, editors LNCS 1119
    • J. Meseguer. Rewriting Logic as a Semantic Framework for Concurrency: A Progress Report. In U. Montanari and V. Sassone, editors, Proc. 7th Intern. Conf. on Concurrency Theory: CONCUR'96, Pisa, August 1996, pages 331-372, 1996. LNCS 1119.
    • (1996) Proc. 7th Intern. Conf. on Concurrency Theory: CONCUR'96, Pisa, August 1996 , pp. 331-372
    • Meseguer, J.1
  • 29
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Needham R., Schroeder M. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM. 21:(12):1978;993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 30
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L. The inductive approach to verifying cryptographic protocols. Journal of Computer Security. 6:1998;85-128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 32
    • 0032678887 scopus 로고    scopus 로고
    • Athena, an Automatic Checker for Security Protocol Analysis
    • IEEE Computer Society
    • Song D. Athena, an Automatic Checker for Security Protocol Analysis. 12th IEEE Computer Security Foundations Workshop. 1999;192-202 IEEE Computer Society
    • (1999) 12th IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.