메뉴 건너뛰기




Volumn 11, Issue 1, 2003, Pages 87-132

Inductive verification of smart card protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; NETWORK PROTOCOLS; SMART CARDS; THEOREM PROVING;

EID: 0037237984     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11103     Document Type: Article
Times cited : (14)

References (30)
  • 1
    • 84883268548 scopus 로고
    • Authentication and delegation with smartcards
    • Research Report 125, Digital - System Research Center
    • M. Abadi, M. Burrows, C. Kaufman and B. Lampson, Authentication and delegation with smartcards, Research Report 125, Digital - System Research Center, 1994.
    • (1994)
    • Abadi, M.1    Burrows, M.2    Kaufman, C.3    Lampson, B.4
  • 4
    • 4243352588 scopus 로고    scopus 로고
    • Message reception in the inductive approach
    • Research Report 460, Computer Laboratory, University of Cambridge; Available on the Internet
    • G. Bella, Message reception in the inductive approach. Research Report 460, Computer Laboratory, University of Cambridge, 1999. Available on the Internet.
    • (1999)
    • Bella, G.1
  • 5
    • 84947223089 scopus 로고    scopus 로고
    • Modelling agents' knowledge inductively
    • B. Christianson, B. Crispo, J.A. Malcolm and R. Michael, eds, LNCS 1796, Springer-Verlag
    • G. Bella, Modelling agents' knowledge inductively, in: Proc. of the 7th International Workshop on Security Protocols, B. Christianson, B. Crispo, J.A. Malcolm and R. Michael, eds, LNCS 1796, Springer-Verlag, 1999, pp. 85-94.
    • (1999) Proc. of the 7th International Workshop on Security Protocols , pp. 85-94
    • Bella, G.1
  • 7
    • 0012639813 scopus 로고    scopus 로고
    • Inductive verification of cryptographic protocols
    • PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge; Available on the Internet
    • G. Bella, Inductive verification of cryptographic protocols. PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge, 2000. Available on the Internet.
    • (2000)
    • Bella, G.1
  • 9
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, LNCS 1485, Springer-Verlag
    • G. Bella and L.C. Paulson, Kerberos version IV: inductive analysis of the secrecy goals, in: Proc. of the 5th European Symposium on Research in Computer Security (ESORICS '98), J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, LNCS 1485, Springer-Verlag, 1998, pp. 361-375.
    • (1998) Proc. of the 5th European Symposium on Research in Computer Security (ESORICS '98) , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 14
    • 85036689619 scopus 로고    scopus 로고
    • Forrester Research
    • Forrester Research, http://www.forrester.com.
  • 20
    • 84949023663 scopus 로고
    • Secret-key agreement without public-key cryptography
    • D.R. Stinson, ed., LNCS 773, Springer-Verlag
    • T. Leighton and S. Micali, Secret-key Agreement without public-key cryptography. in: Proc. of Advances in Cryptography - CRYPTO '93, D.R. Stinson, ed., LNCS 773, Springer-Verlag, 1993. pp. 456-479.
    • (1993) Proc. of Advances in Cryptography - CRYPTO '93 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 22
    • 0002557564 scopus 로고    scopus 로고
    • Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
    • R. Hirschfeld, ed., LNCS 1318. Springer-Verlag
    • D.P. Maher, Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective. in: Proc. of Financial Cryptography '97, R. Hirschfeld, ed., LNCS 1318. Springer-Verlag. 1997. pp. 109-121.
    • (1997) Proc. of Financial Cryptography '97 , pp. 109-121
    • Maher, D.P.1
  • 23
    • 0012685222 scopus 로고    scopus 로고
    • Private conversations
    • C. Meadows, Private conversations, 2001.
    • (2001)
    • Meadows, C.1
  • 24
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Press
    • C. Meadows, Open issues in formal methods for cryptographic protocol analysis, in: Proc. of DISCEX 2000, IEEE Press, 2000.
    • (2000) Proc. of DISCEX 2000
    • Meadows, C.1
  • 25
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C.A. Meadows, The NRL protocol analyzer: an overview, Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.A.1
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 30
    • 84947904235 scopus 로고    scopus 로고
    • Session key distribution using smart cards
    • U. Maurer, ed., LNCS 1070, Springer-Verlag
    • V. Shoup and A. Rubin, Session key distribution using smart cards, in: Advances in Cryptology - Eurocrypt '96, U. Maurer, ed., LNCS 1070, Springer-Verlag, 1996, pp. 321-331.
    • (1996) Advances in Cryptology - Eurocrypt '96 , pp. 321-331
    • Shoup, V.1    Rubin, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.