메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 77-87

Verifying the SET registration protocols

Author keywords

Business communication; Communication system security; Computer network security; Protocols; Software verification and validation; Theorem proving

Indexed keywords

COMPUTER NETWORKS; COMPUTER SOFTWARE SELECTION AND EVALUATION; ELECTRONIC COMMERCE; FORMAL LOGIC; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; THEOREM PROVING;

EID: 0037250327     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806133     Document Type: Article
Times cited : (49)

References (17)
  • 2
    • 33750247207 scopus 로고    scopus 로고
    • Verifying the SET purchase protocols
    • Computer Laboratory, Univ. Cambridge, Cambridge, U.K.
    • G. Bella, F. Massacci, and L. C. Paulson, "Verifying the SET Purchase Protocols," Computer Laboratory, Univ. Cambridge, Cambridge, U.K., 524, 2001.
    • (2001) , pp. 524
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 3
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • F. Cuppens, Y. Deswarte, D. Gollman, and M. Waidner, Eds.
    • G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano, "Formal verification of cardholder registration in SET," in Proc. Computer Security-ESORICS, LNCS 1895, F. Cuppens, Y. Deswarte, D. Gollman, and M. Waidner, Eds., 2000, pp. 159-174.
    • (2000) Proc. Computer Security-ESORICS, LNCS 1895 , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 4
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds.
    • G. Bella and L. C. Paulson, "Kerberos version IV: Inductive analysis of the secrecy goals," in Proc. Computer Security-ESORICS 98, LNCS 1485, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., 1998, pp. 361-375.
    • (1998) Proc. Computer Security-ESORICS 98, LNCS 1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 5
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature: Version 1.0
    • Tech. Rep., Univ. York, Dept. Comput. Sci. [Online]
    • J. Clark and J. Jacob. (1997) A Survey of Authentication Protocol Literature: Version 1.0. Tech. Rep., Univ. York, Dept. Comput. Sci. [Online]. Available: http://www.-users.cs.york.ac.uk/~jac/
    • (1997)
    • Clark, J.1    Jacob, J.2
  • 8
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • R. Focardi and F. Gorrieri, Eds. New York: Springer-Verlag; Lecture Notes in Comp. Sci.
    • J. Guttman, "Security goals: Packet trajectories and strand spaces," in Foundations of Security Analysis and Design-Tutorial Lectures, R. Focardi and F. Gorrieri, Eds. New York: Springer-Verlag, 2001, vol. 2171, Lecture Notes in Comp. Sci., pp. 197-261.
    • (2001) Foundations of Security Analysis and Design-Tutorial Lectures , vol.2171 , pp. 197-261
    • Guttman, J.1
  • 10
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • ____, "Casper: A compiler for the analysis of security protocols," J. Comput. Sec., vol. 6, pp. 53-84, 1998.
    • (1998) J. Comput. Sec. , vol.6 , pp. 53-84
    • Lowe, G.1
  • 11
    • 0012842603 scopus 로고    scopus 로고
    • SET secure electronic transaction specification: Business description. Mastercard and VISA
    • [Online]
    • (1997) SET Secure Electronic Transaction Specification: Business Description. Mastercard and VISA. [Online]. Available: http://www.setco.org.set_specifications.html
    • (1997)
  • 12
    • 0012781105 scopus 로고    scopus 로고
    • SET secure electronic transaction specification: Programmer's guide. Mastercard & VISA
    • [Online]
    • (1997) SET Secure Electronic Transaction Specification: Programmer's Guide. Mastercard & VISA. [Online]. Available: http://www.setco.org/set_specifications.html
    • (1997)
  • 13
    • 0003503018 scopus 로고    scopus 로고
    • Isabelle/HOL: A proof assistant for higher-order logic
    • New York: Springer-Verlag
    • T. Nipkow, L. C. Paulson, and M. Wenzel, "Isabelle/HOL: A Proof Assistant for Higher-Order Logic," in LNCS Tutorial 2283. New York: Springer-Verlag, 2002.
    • (2002) LNCS Tutorial 2283
    • Nipkow, T.1    Paulson, L.C.2    Wenzel, M.3
  • 14
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the NRL protocol analyzer
    • C. Meadows, "Analysis of the Internet key exchange protocol using the NRL protocol analyzer," in Proc. SSP, 1999, pp. 216-231.
    • Proc. SSP, 1999 , pp. 216-231
    • Meadows, C.1
  • 15
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson, "The inductive approach to verifying cryptographic protocols," J. Comput. Sec., vol. 6, pp. 85-128, 1998
    • (1998) J. Comput. Sec. , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 16
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • ____, "Relations between secrets: Two formal analyses of the Yahalom protocol," J. Comput. Sec., vol. 3, pp. 197-216, 2001.
    • (2001) J. Comput. Sec. , vol.3 , pp. 197-216
    • Paulson, L.C.1
  • 17
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recurive authentication protocol. A cautionary tale
    • P. Ryan and S. Schneider, "An attack on a recurive authentication protocol. A cautionary tale," Inform. Processing Lett., vol. 65, no. 15, pp. 7-16, 1998.
    • (1998) Inform. Processing Lett. , vol.65 , Issue.15 , pp. 7-16
    • Ryan, P.1    Schneider, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.