메뉴 건너뛰기




Volumn 298, Issue 3, 2003, Pages 387-415

Secrecy types for asymmetric communication

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTATIONAL METHODS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 0037432692     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0304-3975(02)00863-0     Document Type: Conference Paper
Times cited : (63)

References (36)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi M. Secrecy by typing in security protocols. J. ACM. 46(5):1999;749-786.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • F.L. Bauer, R. Steinbrueggen (Eds.), Foundations of Secure Computation, NATO Science Series, IOS Press, Amsterdam, Marktoberdorf, Germany
    • M. Abadi, Security protocols and their properties, in: F.L. Bauer, R. Steinbrueggen (Eds.), Foundations of Secure Computation, NATO Science Series, IOS Press, Amsterdam, 2000, pp. 39-60. Volume for the 20th International Summer School on Foundations of Secure Computation, Marktoberdorf, Germany, 1999.
    • (1999) 20th International Summer School on Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • An extended version appeared as Digital Equipment Corporation Systems Research Center Report No. 149, January 1998
    • Abadi M., Gordon A.D. A calculus for cryptographic protocols. the spi calculus Inform. and Comput. 148(1):1999;1-70. An extended version appeared as Digital Equipment Corporation Systems Research Center Report No. 149, January 1998.
    • (1999) Inform. and Comput. , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Abadi M., Needham R. Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Engng. 22(1):1996;6-15.
    • (1996) IEEE Trans. Software Engng. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 6
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Anderson R., Needham R. Robustness principles for public key protocols. Proc. Crypto '95. 1995;236-247.
    • (1995) Proc. Crypto '95 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • Silver Spring, MD: IEEE Computer Society, June
    • Blanchet B. An efficient cryptographic protocol verifier based on Prolog rules. 14th IEEE Computer Security Foundations Workshop (CSFW-14). June 2001;82-96 IEEE Computer Society, Silver Spring, MD.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 10
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • CONCUR'98: Concurrency Theory, Berlin: Springer, September
    • Bodei C., Degano P., Nielson F., Nielson H.R. Control flow analysis for the. π-calculus CONCUR'98: Concurrency Theory. Lecture Notes in Computer Science. vol. 1466:September 1998;84-98 Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 11
    • 84865445501 scopus 로고    scopus 로고
    • Secrecy and group creation
    • C. Palamidessi (Ed.), CONCUR 2000: Concurrency Theory. Berlin: Springer, August
    • Cardelli L., Ghelli G., Gordon A.D. Secrecy and group creation. Palamidessi C. CONCUR 2000. Concurrency Theory Lecture Notes in Computer Science. vol. 1877:August 2000;365-379 Springer, Berlin.
    • (2000) Lecture Notes in Computer Science , vol.1877 , pp. 365-379
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 13
    • 0003332235 scopus 로고    scopus 로고
    • A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
    • Rutgers University, New Jersey, September
    • M. Debbabi, M. Mejri, N. Tawbi, I. Yahmadi, A new algorithm for the automatic verification of authentication protocols: from specifications to flaws and attack scenarios, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, September 1997.
    • (1997) Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols
    • Debbabi, M.1    Mejri, M.2    Tawbi, N.3    Yahmadi, I.4
  • 20
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Proc. 27th Internat. Colloq. on Automata, Languages and Programming, Berlin: Springer
    • Hennessy M., Riely J. Information flow vs. resource access in the asynchronous pi-calculus. Proc. 27th Internat. Colloq. on Automata, Languages and Programming, Lecture Notes in Computer Science. 2000;415-427 Springer, Berlin.
    • (2000) Lecture Notes in Computer Science , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 21
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • G. Smolka (Ed.), Programming Languages and Systems: Proc. 9th European Symp. on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), Berlin: Springer
    • Honda K., Vasconcelos V., Yoshida N. Secure information flow as typed process behaviour. Smolka G. Programming Languages and Systems: Proc. 9th European Symp. on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000). Lecture Notes in Computer Science. vol. 1782:2000;180-199 Springer, Berlin.
    • (2000) Lecture Notes in Computer Science , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 22
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer R., Meadows C., Millen J. Three systems for cryptographic protocol analysis. J. Cryptol. 7(2):1994;79-130.
    • (1994) J. Cryptol. , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 23
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, Berlin: Springer
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. vol. 1055:1996;147-166 Springer, Berlin.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 25
    • 85026563474 scopus 로고    scopus 로고
    • On asynchrony in name-passing calculi
    • Proc. 25th Internat. Colloq. on Automata, Languages and Programming, Berlin: Springer
    • Merro M., Sangiorgi D. On asynchrony in name-passing calculi. Proc. 25th Internat. Colloq. on Automata, Languages and Programming. Lecture Notes in Computer Science. vol. 1443:1998;856-867 Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 856-867
    • Merro, M.1    Sangiorgi, D.2
  • 27
    • 44049113210 scopus 로고
    • A calculus of mobile processes, parts I and II
    • Milner R., Parrow J., Walker D. A calculus of mobile processes, parts I and II. Inform. and Comput. 100:1992;1-40, 41-77.
    • (1992) Inform. and Comput. , vol.100 , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 30
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Commun. ACM. 21(12):1978;993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 31
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6(1-2):1998;85-128.
    • (1998) J. Comput. Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 34
    • 84957588448 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Mathematics of Program Construction, 4th Internat. Conf., Berlin: Springer
    • Leino K.R.M., Joshi R. A semantic approach to secure information flow. Mathematics of Program Construction, 4th Internat. Conf. Lecture Notes in Computer Science. vol. 1422:1998;254-271 Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1422 , pp. 254-271
    • Leino, K.R.M.1    Joshi, R.2
  • 35
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano D., Irvine C., Smith G. A sound type system for secure flow analysis. J. Comput. Security. 4:1996;167-187.
    • (1996) J. Comput. Security , vol.4 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 36
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • H. Ganzinger(Ed.), 16th Internat. Conf. on Automated Deduction (CADE-16), Berlin: Springer, July
    • Weidenbach C. Towards an automatic analysis of security protocols in first-order logic. Ganzinger H. 16th Internat. Conf. on Automated Deduction (CADE-16). Lecture Notes in Artificial Intelligence. vol. 1632:July 1999;314-328 Springer, Berlin.
    • (1999) Lecture Notes in Artificial Intelligence , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.