메뉴 건너뛰기




Volumn 291, Issue 3, 2003, Pages 285-327

A comparison of three authentication properties

Author keywords

Authentication; Cryptographic protocols; Non interference; Process algebra; Security

Indexed keywords

ALGEBRA; COMPUTER SCIENCE; COMPUTER SOFTWARE; CRYPTOGRAPHY; NETWORK PROTOCOLS;

EID: 0037421091     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0304-3975(02)00365-1     Document Type: Conference Paper
Times cited : (19)

References (28)
  • 1
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the spi calculus
    • Proc. CONCUR'97,
    • M. Abadi, A.D. Gordon, Reasoning about cryptographic protocols in the spi calculus, in: Proc. CONCUR'97, Lecture Notes in Computer Science, Vol. 1243, 1997, pp. 59-73.
    • (1997) Lecture Notes in Computer Science , vol.1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0032670195 scopus 로고    scopus 로고
    • Authentication via localized names
    • New York: IEEE Press
    • Bodei C., Degano P., Focardi R., Priami C. Authentication via localized names. Proc. CSFW'99. 1999;98-110 IEEE Press, New York.
    • (1999) Proc. CSFW'99 , pp. 98-110
    • Bodei, C.1    Degano, P.2    Focardi, R.3    Priami, C.4
  • 6
    • 0032659620 scopus 로고    scopus 로고
    • CVS: A compiler for the analysis of cryptographic protocols
    • New York: IEEE Press
    • Durante A., Focardi R., Gorrieri R. CVS. A compiler for the analysis of cryptographic protocols Proc. CSFW'99. 1999;203-212 IEEE Press, New York.
    • (1999) Proc. CSFW'99 , pp. 203-212
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 9
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. J. Comput. Security. 3(1):1994/1995;5-33.
    • (1994) J. Comput. Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi R., Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Software Eng. 23(9):1997;550-571.
    • (1997) IEEE Trans. Software Eng. , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • U. Montanari (Ed.), Proc. 27th Internat. Coll. on Automata, Languages and Programming (ICALP'00)
    • R. Focardi, R. Gorrieri, F. Martinelli, Non interference for the analysis of cryptographic protocols, in: U. Montanari (Ed.), Proc. 27th Internat. Coll. on Automata, Languages and Programming (ICALP'00), Lecture Notes in Computer Science, Vol. 1853, July 2000, pp. 354-372.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 17
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. TACAS'96
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proc. TACAS'96, Lecture Notes in Computer Science, Vol. 1055, 1996, pp. 146-166.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 146-166
    • Lowe, G.1
  • 18
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specification
    • New York: IEEE Press
    • Lowe G. A hierarchy of authentication specification. Proc. 10th Computer Security Foundation Workshop. 1997;31-43 IEEE Press, New York.
    • (1997) Proc. 10th Computer Security Foundation Workshop , pp. 31-43
    • Lowe, G.1
  • 20
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • Singapore: World Scientific
    • Martinelli F. Languages for description and analysis of authentication protocols. Proc. ICTCS'98. 1998;304-315 World Scientific, Singapore.
    • (1998) Proc. ICTCS'98 , pp. 304-315
    • Martinelli, F.1
  • 21
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • New York: IEEE Press
    • Martinelli F. Partial model checking and theorem proving for ensuring security properties. Proc. CSFW'98, 1998;44-52 IEEE Press, New York.
    • (1998) Proc. CSFW'98, , pp. 44-52
    • Martinelli, F.1
  • 22
    • 4243442726 scopus 로고    scopus 로고
    • Tech. Report IAT-B4-006, July, accepted for publication on TCS (under minor revisions)
    • F. Martinelli, Analysis of security protocols as open systems, Tech. Report IAT-B4-006, July 2001, accepted for publication on TCS (under minor revisions).
    • (2001) Analysis of security protocols as open systems
    • Martinelli, F.1
  • 24
    • 0032646572 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • New York: IEEE Press
    • Ryan P.Y.A., Schneider S. Process algebra and non-interference. Proc. CSFW'99. 1999;214-227 IEEE Press, New York.
    • (1999) Proc. CSFW'99 , pp. 214-227
    • Ryan, P.Y.A.1    Schneider, S.2
  • 26
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • New York: IEEE Press
    • Schneider S. Formal analysis of a non-repudiation protocol. Proc. CSFW'98. 1998;54-65 IEEE Press, New York.
    • (1998) Proc. CSFW'98 , pp. 54-65
    • Schneider, S.1
  • 27
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Schneider S. Verifying authentication protocols in CSP. IEEE Trans. Software Eng. 24(9):1998.
    • (1998) IEEE Trans. Software Eng. , vol.24 , Issue.9
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.