메뉴 건너뛰기




Volumn 26, Issue 2 SPEC. ISS., 1996, Pages 113-131

The NRL protocol analyzer: An overview

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; PROLOG (PROGRAMMING LANGUAGE);

EID: 0030084918     PISSN: 07431066     EISSN: None     Source Type: Journal    
DOI: 10.1016/0743-1066(95)00095-x     Document Type: Review
Times cited : (300)

References (17)
  • 1
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • Aziz, A. and Diffie, W., Privacy and Authentication for Wireless Local Area Networks, IEEE Personal Commun. 1(1):25-31 (1994).
    • (1994) IEEE Personal Commun. , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 2
    • 0025388480 scopus 로고
    • A security scheme for resource shoring over a network
    • Burns, J. and Mitchell, C. J., A Security Scheme for Resource Shoring Over a Network, Computers and Security 9:67-76 (1990).
    • (1990) Computers and Security , vol.9 , pp. 67-76
    • Burns, J.1    Mitchell, C.J.2
  • 4
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning, D. E. and Sacco, G. M., Timestamps in Key Distribution Protocols, Commun. ACM 24(8):533-536 (1981).
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0020190170 scopus 로고
    • On the security of ping-pong protocols
    • Dolev, D., Even, S., and Karp, R., On the Security of Ping-Pong Protocols, Inform. Control 55:57-68 (1982).
    • (1982) Inform. Control , vol.55 , pp. 57-68
    • Dolev, D.1    Even, S.2    Karp, R.3
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D. and Yao, A., On the Security of Public Key Protocols, IEEE Trans. Inform. Theory 29(2):198-208 (1983).
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 9
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer, R., Meadows, C., and Millen, J., Three Systems for Cryptographic Protocol Analysis, J. Cryptology 7(2):79-130 (1994).
    • (1994) J. Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 10
  • 11
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Meadows, C., Applying Formal Methods to the Analysis of a Key Management Protocol, J. Computer Security 1:5-53 (1992).
    • (1992) J. Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 12
    • 0001566477 scopus 로고    scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • to Springer-Verlag, Berlin
    • Meadows, C., Formal Verification of Cryptographic Protocols: A Survey, in: Proceedings of AsiaCrypt '94, to Springer-Verlag, Berlin, pp. 133-150.
    • Proceedings of AsiaCrypt '94 , pp. 133-150
    • Meadows, C.1
  • 13
    • 0002088427 scopus 로고
    • A note on the use of timestamps as nonces
    • Neuman, B. C. and Stubblebine, S. G., A Note on the Use of Timestamps as Nonces, Operating Syst. Rev. 27(2):10-14 (1993).
    • (1993) Operating Syst. Rev. , vol.27 , Issue.2 , pp. 10-14
    • Neuman, B.C.1    Stubblebine, S.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.