메뉴 건너뛰기




Volumn 14, Issue 2, 1999, Pages 171-191

Model-based verification of a security protocol for conditional access to services

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; MULTIMEDIA SYSTEMS; SECURITY OF DATA;

EID: 0033099317     PISSN: 09259856     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1008683519655     Document Type: Article
Times cited : (7)

References (34)
  • 3
    • 19344369103 scopus 로고    scopus 로고
    • Towards a mechanization of cryptographic protocol verification
    • LNCS 1254, Springer-Verlag
    • D. Bolignano, "Towards a mechanization of cryptographic protocol verification," in Proc. of CAV 97, LNCS 1254, Springer-Verlag, 1997.
    • (1997) Proc. of CAV 97
    • Bolignano, D.1
  • 4
    • 0023544236 scopus 로고
    • Introduction to the ISO specification language LOTOS
    • T. Bolognesi and E. Brinksma, "Introduction to the ISO specification language LOTOS," Computer Networks and ISDN Systems, Vol. 14, No. 1, pp. 25-59, 1987.
    • (1987) Computer Networks and ISDN Systems , vol.14 , Issue.1 , pp. 25-59
    • Bolognesi, T.1    Brinksma, E.2
  • 8
    • 0020190170 scopus 로고
    • On the security of ping-pong protocols
    • D. Dolev, S. Even, and R. Karp, "On the security of ping-pong protocols," Information and Control, Vol. 55, pp. 57-68, 1982.
    • (1982) Information and Control , vol.55 , pp. 57-68
    • Dolev, D.1    Even, S.2    Karp, R.3
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, Vol. 29, No. 2, pp. 198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 10
    • 0003307585 scopus 로고
    • Fundamentals of algebraic specification 1, equations and initial semantics
    • W. Brauer, B. Rozenberg, and A. Salomaa (Eds.), Springer Verlag
    • H. Ehrig and B. Mahr, "Fundamentals of algebraic specification 1, equations and initial semantics," in W. Brauer, B. Rozenberg, and A. Salomaa (Eds.), EATCS, Monographs on Theoretical Computer Science, Springer Verlag, 1985.
    • (1985) EATCS, Monographs on Theoretical Computer Science
    • Ehrig, H.1    Mahr, B.2
  • 12
    • 1942526832 scopus 로고    scopus 로고
    • An overview of the eucalyptus toolbox
    • Maribor, Slovenia, June
    • H. Garavel, "An overview of the eucalyptus toolbox, in Proc. of the COST247 Workshop," Maribor, Slovenia, June 1996.
    • (1996) Proc. of the COST247 Workshop
    • Garavel, H.1
  • 15
    • 84959165880 scopus 로고    scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • LNCS 330, Springer-Verlag
    • L. Guillou and J.-J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," in Proc. of Eurocrypt'88, LNCS 330, Springer-Verlag, pp. 123-128.
    • Proc. of Eurocrypt'88 , pp. 123-128
    • Guillou, L.1    Quisquater, J.-J.2
  • 19
    • 0024665744 scopus 로고
    • Using formal methods to analyse encryption protocols
    • R. Kemmerer, "Using formal methods to analyse encryption protocols," IEEE Journal on Selected Areas in Communications, Vol. 7, No. 4, pp. 448-457, 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.1
  • 20
    • 0343286683 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen, "Three systems for cryptographic protocol analysis," Journal of Cryptology, Vol. 7, No. 2, pp. 14-18, 1989.
    • (1989) Journal of Cryptology , vol.7 , Issue.2 , pp. 14-18
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 23
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe, "An attack on the Needham-Schroeder public-key authentication protocol," Information Processing Letters, Vol. 56, pp. 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 24
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • T. Margaria and B. Steffen (Eds.), LNCS 1055, Springer-Verlag
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in T. Margaria and B. Steffen (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, LNCS 1055, Springer-Verlag, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems
    • Lowe, G.1
  • 25
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows, "Applying formal methods to the analysis of a key management protocol," Journal of Computer Security, 1992.
    • (1992) Journal of Computer Security
    • Meadows, C.1
  • 26
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyser: An overview
    • C. Meadows, "The NRL protocol analyser: An overview," Journal of Logic Programming, Vol. 26, No. 8, pp. 113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.8 , pp. 113-131
    • Meadows, C.1
  • 27
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • LNCS 917
    • C. Meadows, "Formal verification of cryptographic protocols: A survey," in Proc. of Asiacrypt 94, LNCS 917, pp. 133-150, 1995.
    • (1995) Proc. of Asiacrypt 94 , pp. 133-150
    • Meadows, C.1
  • 31
    • 0017930809 scopus 로고
    • On a method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman, "On a method for obtaining digital signatures and public key cryptosystems," Communication of the ACM, Vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Communication of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 32
    • 0342417109 scopus 로고
    • ELUDO: The University of Ottawa Toolkit
    • University of Ottawa, Obtainable by FTP
    • B. Stepien, J. Tourrilhes, and J. Sincennes, "ELUDO: The University of Ottawa Toolkit," Technical Report, University of Ottawa, 1994. Obtainable by FTP at lotos.csi.uottawa.ca.
    • (1994) Technical Report
    • Stepien, B.1    Tourrilhes, J.2    Sincennes, J.3
  • 33
    • 0024936551 scopus 로고
    • Use of formal technique in the specification of authentication protocols
    • V Varadharajan, "Use of formal technique in the specification of authentication protocols," Computer Standards and Interfaces, Vol. 9, pp. 203-215, 1989.
    • (1989) Computer Standards and Interfaces , vol.9 , pp. 203-215
    • Varadharajan, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.