메뉴 건너뛰기




Volumn , Issue , 1998, Pages 106-115

Efficient finite-state analysis for large security protocols

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMMUNICATION SYSTEMS; FINITE AUTOMATA; GRAPH THEORY; MATHEMATICAL MODELS; OPTIMIZATION; SECURITY OF DATA;

EID: 0031627781     PISSN: 10636900     EISSN: None     Source Type: None    
DOI: 10.1109/CSFW.1998.683160     Document Type: Conference Paper
Times cited : (38)

References (11)
  • 1
    • 84947418221 scopus 로고    scopus 로고
    • Towards a mechanization of cryptographic protocol verification
    • D. Bolignano Towards a mechanization of cryptographic protocol verification Computer Aided Verification. 9th International Conference 131 142 Computer Aided Verification. 9th International Conference 1997
    • (1997) , pp. 131-142
    • Bolignano, D.1
  • 2
    • 85176666670 scopus 로고    scopus 로고
    • The Mur[illegible text] verification system
    • D. L. Dill The Mur[illegible text] verification system Computer Aided Verification. 8th International Conference 390 393 Computer Aided Verification. 8th International Conference 1996
    • (1996) , pp. 390-393
    • Dill, D.L.1
  • 3
    • 0001771327 scopus 로고
    • Formal specification of abstract memory models
    • D. L. Dill S. Park A. G. Nowatzyk Formal specification of abstract memory models Symposium on Research on Integrated Systems 38 52 Symposium on Research on Integrated Systems 1993
    • (1993) , pp. 38-52
    • Dill, D.L.1    Park, S.2    Nowatzyk, A.G.3
  • 5
    • 85176677428 scopus 로고
    • J. T. Kohl B. C. Neuman The Kerberos network authentication service (version 5) September 1993 Internet Request For Comments RFC-1510
    • (1993)
    • Kohl, J.T.1    Neuman, B.C.2
  • 6
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • G. Lowe Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems 1996
    • (1996)
    • Lowe, G.1
  • 7
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using Mur[illegible text]
    • J. C. Mitchell M. Mitchell U. Stern Automated analysis of cryptographic protocols using Mur[illegible text] IEEE Symposium on Security and Privacy 141 151 IEEE Symposium on Security and Privacy 1997
    • (1997) , pp. 141-151
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 8
    • 85024253955 scopus 로고    scopus 로고
    • Finite-state analysis of SSL 3.0
    • J. C. Mitchell V. Shmatikov U. Stern Finite-state analysis of SSL 3.0 7th USENIX Security Symposium 201 215 7th USENIX Security Symposium 1998
    • (1998) , pp. 201-215
    • Mitchell, J.C.1    Shmatikov, V.2    Stern, U.3
  • 9
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham M. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 993 999 1978
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 10
    • 84948129403 scopus 로고
    • Automatic verification of the SCI cache coherence protocol
    • U. Stern D. L. Dill Automatic verification of the SCI cache coherence protocol Advanced Research Working Conference on Correct Hardware Design and Verification Methods 21 34 Advanced Research Working Conference on Correct Hardware Design and Verification Methods 1995
    • (1995) , pp. 21-34
    • Stern, U.1    Dill, D.L.2
  • 11
    • 0029226478 scopus 로고
    • System design methodology of UltraSPARC™-I
    • L. Yang D. Gao J. Mostoufi R. Joshi P. Loewenstein System design methodology of UltraSPARC™-I 32nd Design Automation Conference 7 12 32nd Design Automation Conference 1995
    • (1995) , pp. 7-12
    • Yang, L.1    Gao, D.2    Mostoufi, J.3    Joshi, R.4    Loewenstein, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.