메뉴 건너뛰기




Volumn , Issue , 2000, Pages 52-62

Optimizing protocol rewrite rules of CIL specifications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DATA PRIVACY; DATA STRUCTURES; HIGH LEVEL LANGUAGES; IMAGE CODING; JAVA PROGRAMMING LANGUAGE; NETWORK PROTOCOLS; OPTIMIZATION; THEOREM PROVING;

EID: 0033701252     PISSN: 10636900     EISSN: None     Source Type: Journal    
DOI: 10.1109/CSFW.2000.856925     Document Type: Article
Times cited : (9)

References (8)
  • 1
    • 85176669340 scopus 로고    scopus 로고
    • An interface specification language for automatically analyzing cryptographic protocols
    • S. Brackin An interface specification language for automatically analyzing cryptographic protocols Symposium on Network and Distributed System Security Symposium on Network and Distributed System Security 1997-February
    • (1997)
    • Brackin, S.1
  • 2
    • 0028099086 scopus 로고
    • Generating formal cryptographic protocol specifications
    • U. Carlsen Generating formal cryptographic protocol specifications IEEE Symposium on Research in Security and Privacy 137 146 IEEE Symposium on Research in Security and Privacy 1994
    • (1994) , pp. 137-146
    • Carlsen, U.1
  • 3
    • 0032671775 scopus 로고    scopus 로고
    • A meta-notation for protocol analysis
    • I. Cervesato N. Durgin P. Lincoln J. Mitchell A. Scedrov A meta-notation for protocol analysis 12th IEEE Computer Security Foundations Workshop 55 69 12th IEEE Computer Security Foundations Workshop 1999
    • (1999) , pp. 55-69
    • Cervesato, I.1    Durgin, N.2    Lincoln, P.3    Mitchell, J.4    Scedrov, A.5
  • 4
    • 85177110970 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • E. Clarke S. Jha W. Marrero Using state space exploration and a natural deduction style message derivation engine to verify security protocols Proc. IFIP Working Conference on Programming Concepts and Methods (PROCOMET) Proc. IFIP Working Conference on Programming Concepts and Methods (PROCOMET) 1998
    • (1998)
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 5
    • 0004073041 scopus 로고    scopus 로고
    • CAPSL and CIL Language Design: A Common Authentication Protocol Specification Language and Its Intermediate Language
    • CA, Menlo Park
    • G. Denker J. Millen CAPSL and CIL Language Design: A Common Authentication Protocol Specification Language and Its Intermediate Language 1999 CA, Menlo Park SRI-CSL-9902 Computer Science Laboratory, SRI International http://www.csl.sri.com/denker/pub_99.html
    • (1999)
    • Denker, G.1    Millen, J.2
  • 6
    • 0003902378 scopus 로고    scopus 로고
    • CAPSL Integrated Protocol Environment
    • SC
    • G. Denker J. Millen CAPSL Integrated Protocol Environment Proc. DARPA Information Survivability Conference and Exposition, DISCEX2000 Proc. DARPA Information Survivability Conference and Exposition, DISCEX2000 Hilton Head Island USA SC 2000-January-25-27 http://schafercorp—ballston. com/discex/
    • (2000)
    • Denker, G.1    Millen, J.2
  • 7
    • 0031633395 scopus 로고    scopus 로고
    • Casper: a compiler for the analysis of security protocols
    • G. Lowe Casper: a compiler for the analysis of security protocols Journal of Computer Security 6 1 53 84 1998
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 8
    • 85177109162 scopus 로고    scopus 로고
    • J. Millen CAPSL Web Site 1999 http://www.csl.sri. com/millen/capsl
    • (1999)
    • Millen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.