메뉴 건너뛰기




Volumn , Issue , 2000, Pages 77-87

Dynamic analysis of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INTERNET; NETWORK PROTOCOLS; REAL TIME SYSTEMS;

EID: 0034593312     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366194     Document Type: Conference Paper
Times cited : (9)

References (44)
  • 3
    • 84961760201 scopus 로고    scopus 로고
    • Automatically detecting most vulnerabilities in cryptographic protocols
    • January
    • S. Brackin, "Automatically Detecting Most Vulnerabilities in Cryptographic Protocols", in The DARPA Information Survivability Conference and Exposition, January 2000, Vol.1, pp 222-36
    • (2000) The DARPA Information Survivability Conference and Exposition , vol.1 , pp. 222-236
    • Brackin, S.1
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Aug.
    • D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, vol. 24, no. 8, Aug 1981, pp. 533-536
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0006025721 scopus 로고    scopus 로고
    • Identification of host audit data to detect attacks on low-level IP
    • Daniels and Spafford, "Identification of Host Audit Data to Detect Attacks on Low-level IP", Journal of Computer Security, Volume 7, Issue 1, 1999
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Daniels1    Spafford2
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • (Mar.). Also Stan-CS-81-854, May 1981, Stanford U.
    • Dolev, D., and Yao, A.C. "On the security of public key protocols". IEEE Trans. Inf. Theory IT-29, 2(Mar. 1983), pp. 198-208. Also Stan-CS-81-854, May 1981, Stanford U.
    • (1983) IEEE Trans. Inf. Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proc. of Crypto∼'86 (Lecture Notes in Computer Science 263), Editor A. Odlyzko, Springer-Verlag, Santa Barbara, California, U. S. A., August 11-15
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems", Advances in Cryptology, Proc. of Crypto∼'86 (Lecture Notes in Computer Science 263), Editor A. Odlyzko, Springer-Verlag, pp. 186-194, Santa Barbara, California, U. S. A., August 11-15, 1987
    • (1987) Advances in Cryptology , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 12
    • 0024665744 scopus 로고
    • Using formal methods to analyze encryption protocols
    • May
    • R. A. Kemmerer, "Using Formal Methods to Analyze Encryption Protocols," IEEE Journal on Selected Areas in Communications, vol. 7, mo. 4, pp. 448-457, May 1989
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 13
    • 85068233104 scopus 로고
    • On belief evolution in authentication protocols
    • IEEE Computer Society Press, Los Alamitos, CA
    • Rajeshekar Kailar and Virgil D. Gligor, "On Belief Evolution in Authentication Protocols", In Proceedings of the Computer Security Foundations Workshop IV, PP 103-16, IEEE Computer Society Press, Los Alamitos, CA, 1991
    • (1991) Proceedings of the Computer Security Foundations Workshop IV , pp. 103-116
    • Kailar, R.1    Gligor, V.D.2
  • 19
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • Gavin Lowe, "An Attack on the Needham-Schroeder Public Key Authentication Protocol", Information Processing Letters, 56:131-133, 1995
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public key protocol using FDR
    • Proceedings of TACAS, Springer-Verlag
    • Gavin Lowe, "Breaking and Fixing the Needham-Schroeder Public Key Protocol Using FDR", In Proceedings of TACAS, Vol. 1055 of Lecture Notes in Computer Science, pp 147-166, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
  • 22
    • 84882791488 scopus 로고    scopus 로고
    • Gavin Lowe, "Casper: A Compiler for the Analysis of Security Protocols", Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
  • 23
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis
    • Feb.
    • Millen, J.K., Clark, S. C., and Freedman, S. B. "The interrogator: Protocol security analysis". IEEE Trans. Sofw. eng. SB-13, 2(Feb. 1987), pp. 274-288
    • (1987) IEEE Trans. Sofw. Eng. , vol.SB-13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 24
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • LNSC 917, Springer-Verlag
    • Catherine Meadows, "Formal Verification of Cryptographic Protocols: A Survey," Advances in Cryptology - Asiacrypt '94, LNSC 917, Springer-Verlag, 1995, pp. 133-150
    • (1995) Advances in Cryptology - Asiacrypt '94 , pp. 133-150
    • Meadows, C.1
  • 26
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • Jun 28-30, Mordano, Italy
    • Catherine Meadows, "A Formal Framework and Evaluation Method for Network Denial of Service", 12th IEEE Computer Security Foundations Workshop, Jun 28-30, 1999, Mordano, Italy
    • (1999) 12th IEEE Computer Security Foundations Workshop
    • Meadows, C.1
  • 27
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • Roger M. Needham, Michael D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, December 1978 vol. 21 #12, pp. 993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 28
    • 0032665338 scopus 로고    scopus 로고
    • Security issues related to mobile code and agent-based systems
    • July
    • R. Oppliger. Security issues related to mobile code and agent-based systems, pp. 1165-1170. Computer Communications, Vol. 22, No. 12 (July 1999):
    • (1999) Computer Communications , vol.22 , Issue.12 , pp. 1165-1170
    • Oppliger, R.1
  • 31
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Jun 28-30, 99, Mordano, Italy
    • Dawn Xiaodong Song, "Athena: A New Efficient Automatic Checker for Security Protocol Analysis", 12th IEEE Computer Security Foundations Workshop, Jun 28-30, 99, Mordano, Italy
    • 12th IEEE Computer Security Foundations Workshop
    • Song, D.X.1
  • 36
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • Vigna and Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, Volume 7, Issue 1, 1999
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna1    Kemmerer2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.