메뉴 건너뛰기




Volumn 11, Issue 2, 2003, Pages 189-216

First-order verification of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; DISTRIBUTED COMPUTER SYSTEMS;

EID: 0037271415     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11203     Document Type: Conference Paper
Times cited : (23)

References (26)
  • 1
    • 84863900858 scopus 로고    scopus 로고
    • Mechanising BAN Kerberos by the inductive method
    • G. Bella and L. Paulson, Mechanising BAN Kerberos by the inductive method, in: CAV 10, 1998, pp. 416-427.
    • (1998) CAV , vol.10 , pp. 416-427
    • Bella, G.1    Paulson, L.2
  • 2
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • G. Bella and L.C. Paulson, Kerberos version IV: Inductive analysis of the secrecy goals, in: ESORICS 5, 1998, pp. 361-375.
    • (1998) ESORICS , vol.5 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 3
    • 0005078946 scopus 로고
    • Entity authentication and key distribution (extended abstract)
    • M. Bellaire and P. Rogaway, Entity authentication and key distribution (extended abstract), in: CRYPTO 13, 1993.
    • (1993) CRYPTO , vol.13
    • Bellaire, M.1    Rogaway, P.2
  • 4
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • M. Bellare and P. Rogaway, Provably secure session key distribution: the three party case, in: STOC 27, 1995, pp. 57-66.
    • (1995) STOC , vol.27 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic prolotocol verifier based on prolog rules
    • B. Blanchet, An efficient cryptographic prolotocol verifier based on prolog rules, in: CSFW 14, 2001.
    • (2001) CSFW , vol.14
    • Blanchet, B.1
  • 6
    • 0003246105 scopus 로고    scopus 로고
    • Symbolic analysis of cryptographic protocols in the spi-calculus
    • M. Boreale, Symbolic analysis of cryptographic protocols in the spi-calculus, in: ICALP '01, 2001.
    • (2001) ICALP '01
    • Boreale, M.1
  • 10
    • 0013168959 scopus 로고    scopus 로고
    • Honest ideals in strand spaces
    • F. Fabrega, J. Herzog and J. Guttman, Honest ideals in strand spaces, in: CSFW 11, 1998.
    • (1998) CSFW , vol.11
    • Fabrega, F.1    Herzog, J.2    Guttman, J.3
  • 12
    • 0033683193 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: CSFW 13, 2000, pp. 255-268.
    • (2000) CSFW , vol.13 , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 13
    • 0033683607 scopus 로고    scopus 로고
    • Towards automatic verification of authentication protocols on an unbounded network
    • J. Heather and S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 13, 2000, pp. 132-143.
    • (2000) CSFW , vol.13 , pp. 132-143
    • Heather, J.1    Schneider, S.2
  • 15
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe, Casper: A compiler for the analysis of security protocols, in: CSFW 10, 1997.
    • (1997) CSFW , vol.10
    • Lowe, G.1
  • 17
    • 0029700221 scopus 로고    scopus 로고
    • Language generation and verification in the NRL protocol analyzer
    • C. Meadows, Language generation and verification in the NRL protocol analyzer, in: CSFW 9, 1996, pp. 48-61.
    • (1996) CSFW , vol.9 , pp. 48-61
    • Meadows, C.1
  • 18
    • 0033682446 scopus 로고    scopus 로고
    • Invariant generation techniques in cryptographic protocol analysis
    • C. Meadows, Invariant generation techniques in cryptographic protocol analysis, in: CSFW 13, 2000.
    • (2000) CSFW , vol.13
    • Meadows, C.1
  • 21
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson, The inductive approach to verifying cryptographic protocols, JCS 6 (1998), 85-128.
    • (1998) JCS , vol.6 , pp. 85-128
    • Paulson, L.1
  • 22
    • 0030684956 scopus 로고    scopus 로고
    • Verifying authentication protocols with CSP
    • S. Schneider, Verifying authentication protocols with CSP, in: CSFW 10, 1997.
    • (1997) CSFW , vol.10
    • Schneider, S.1
  • 23
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • D. Song, Athena: A new efficient automatic checker for security protocol analysis, in: CSFW 12, 1999.
    • (1999) CSFW , vol.12
    • Song, D.1
  • 25
    • 0001592091 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: CADE 16, 1999.
    • (1999) CADE , vol.16
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.