메뉴 건너뛰기




Volumn , Issue , 1999, Pages 197-206

A framework for a cryptographic protocol evaluation workbench

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SYSTEMS ENGINEERING;

EID: 0013295446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2017.809495     Document Type: Conference Paper
Times cited : (3)

References (28)
  • 7
    • 0004253669 scopus 로고
    • [DIJK76] Prentice Hall Series in Automatic Computation Prentice-Hall Inc. Englewood Cliffs, NJ
    • [DIJK76] Edsger W. Dijkstra, "A Discipline of Programming", Prentice Hall Series in Automatic Computation, Prentice-Hall Inc. Englewood Cliffs, NJ, 1976
    • (1976) A Discipline of Programming
    • Edsger, W.1    Dijkstra2
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [DOL83] Mar.
    • [DOL83] Dolev, D, Yao, A.C. "On the security of public key protocols". IEEE Trans. Inf. Theory IT-29, 2(Mar. 1983), pp. 198-208
    • (1983) IEEE Trans. Inf. Theory , vol.2 IT-29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 11
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • [HOAR69] Oct
    • [HOAR69] C.A.R. Hoare, "An Axiomatic Basis for Computer Programming", Communications of the ACM, Vol 12, Number 10, Oct 1969
    • (1969) Communications of the ACM , vol.12 , Issue.10
    • Hoare, C.A.R.1
  • 14
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis
    • [MIL87] Feb.
    • [MIL87] Millen, J.K., Clark, S. C., Freedman, S. B. "The interrogator: Protocol security analysis". IEEE Trans. Sofw. eng. SE-13, 2(Feb. 1987), pp. 274-288
    • (1987) IEEE Trans. Sofw. Eng. , vol.SE-13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 16
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • [NS78] Dec.
    • [NS78] Needham, R. M., Schroeder, M. D. "Using encryption for authentication in large networks of computers". Commun. ACM 21, 12 (Dec. 1978), pp. 993-999
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 0025405980 scopus 로고
    • A critique of the burrows, abadi, needham logic
    • [NESS90] April
    • [NESS90] D. Nessett, "A Critique of the Burrows, Abadi, Needham Logic", ACM Operating Systems Review, vol. 24, no. 2, April 1990, pp. 35-38
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.1
  • 19
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • [OTWY87] Jan.
    • [OTWY87] Otwy, D., Rees, O. "Efficient and timely mutual authentication". Operating Systems Review 21, 1(Jan. 1987), pp. 8-10
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otwy, D.1    Rees, O.2
  • 22
    • 84974755213 scopus 로고
    • Knowledge, belief, semantics in the analysis of cryptographic protocols
    • [SYV92]
    • [SYV92] Syverson, P., "Knowledge, Belief, Semantics in the Analysis of Cryptographic Protocols", Journal of Computer Security 1 (1992), pp 317-334
    • (1992) Journal of Computer Security , vol.1 , pp. 317-334
    • Syverson, P.1
  • 24
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • [SYV93b] October
    • [SYV93b] Syverson, P., "On Key Distribution Protocols for Repeated Authentication" Operating Systems Review vol 27, no 4, October 1993, pp. 24-30.
    • (1993) Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.