메뉴 건너뛰기




Volumn 18, Issue 4, 2000, Pages 571-581

Formal characterization and automated analysis of known-pair and chosen-text attacks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0033741481     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/49.839933     Document Type: Article
Times cited : (11)

References (14)
  • 1
    • 0005716003 scopus 로고
    • Request for Comments (Proposed Standard) RFC 1827, Aug.
    • IP Encapsulating Security Payload (ESP), Request for Comments (Proposed Standard) RFC 1827, Aug. 1995.
    • (1995) IP Encapsulating Security Payload (ESP)
  • 3
    • 85084160050 scopus 로고    scopus 로고
    • Problem areas for the IP security protocols
    • San Jose, CA, July
    • S. M. Bellovin, "Problem areas for the IP security protocols," in Proc. 6th Usenix UNIX Security Symp., San Jose, CA, July 1996.
    • (1996) Proc. 6th Usenix UNIX Security Symp.
    • Bellovin, S.M.1
  • 5
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Jan.
    • _, "Applying formal methods to the analysis of a key management protocol," J. Computer Security, vol. 1, no. 1, Jan. 1992.
    • (1992) J. Computer Security , vol.1 , Issue.1
  • 6
    • 0343751640 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • _, "The NRL protocol analyzer: An overview," J. Logic Programming, vol. 19, no. 20, pp. 1-679, 1996.
    • (1996) J. Logic Programming , vol.19 , Issue.20 , pp. 1-679
  • 7
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the NRL protocol analyzer
    • May
    • _, "Analysis of the Internet key exchange protocol using the NRL protocol analyzer," in Proc. 1999 IEEE Symp. Security Privacy, May 1999.
    • (1999) Proc. 1999 IEEE Symp. Security Privacy
  • 8
    • 0342880838 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    • Berlin: Springer-Verlag, Sept.
    • _, "Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches," in Computer Security - ES-ORICS'96. Berlin: Springer-Verlag, Sept. 1996, pp. 364-365.
    • (1996) Computer Security - ES-ORICS'96 , pp. 364-365
  • 9
    • 0343751641 scopus 로고
    • Request for Comments (Proposed Standard) RFC 1829, Aug.
    • The ESP DES-CBC Transform, Request for Comments (Proposed Standard) RFC 1829, Aug. 1995.
    • (1995) The ESP DES-CBC Transform
  • 10
    • 0342880828 scopus 로고
    • Protecting the integrity of privacy-enhanced electronic mail with DES-based authentication codes
    • San Diego, CA, Feb.
    • S. Stubblebine and V. Gligor, "Protecting the integrity of privacy-enhanced electronic mail with DES-based authentication codes," presented at the PSRG Workshop on Network and Distributed System Security, San Diego, CA, Feb. 1993.
    • (1993) PSRG Workshop on Network and Distributed System Security
    • Stubblebine, S.1    Gligor, V.2
  • 11
    • 0027227138 scopus 로고
    • Protocol design for integrity protection
    • Oakland, CA, May
    • _, "Protocol design for integrity protection," in IEEE Computer Soc. Symp. Research Security Privacy, Oakland, CA, May 1993, pp. 41-53.
    • (1993) IEEE Computer Soc. Symp. Research Security Privacy , pp. 41-53
  • 12
    • 0026851843 scopus 로고
    • On message integrity in cryptographic protocols
    • Oakland, CA, May
    • _, "On message integrity in cryptographic protocols," in IEEE Computer Soc. Symp. Research Security Privacy, Oakland, CA, May 1992, pp. 85-104.
    • (1992) IEEE Computer Soc. Symp. Research Security Privacy , pp. 85-104
  • 14
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • June
    • V. L. Voydock and S. T. Kent, "Security mechanisms in high-level network protocols," Computing Surveys, vol. 15, no. 2, June 1983.
    • (1983) Computing Surveys , vol.15 , Issue.2
    • Voydock, V.L.1    Kent, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.