메뉴 건너뛰기




Volumn 86, Issue 2, 2003, Pages 57-62

Flaw and modification of the i KP electronic payment protocols

Author keywords

Agreement property; Electronic payment protocol; Safety security in digital systems

Indexed keywords

NETWORK PROTOCOLS; SECURITY OF DATA; WORLD WIDE WEB;

EID: 0037473394     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0020-0190(02)00480-5     Document Type: Article
Times cited : (24)

References (10)
  • 5
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Inform. Process. Lett. 56:1995;131-133.
    • (1995) Inform. Process. Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Comm. ACM. 21:(12):1978;993-999.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 8
    • 0012245984 scopus 로고    scopus 로고
    • Formal analysis of the i KP electronic payment protocols
    • IS-RR-2002-020
    • K. Ogata, K. Futatsugi, Formal analysis of the i KP electronic payment protocols. JAIST Research Report, IS-RR-2002-020, 2002.
    • (2002) JAIST Research Report
    • Ogata, K.1    Futatsugi, K.2
  • 9
    • 0012305831 scopus 로고    scopus 로고
    • Rewriting-based verification of authentication protocols
    • Amsterdam: Elsevier Science Publishers
    • Ogata K., Futatsugi K. Rewriting-based verification of authentication protocols. WRLA'02, ENTCS, Vol. 71. 2002;Elsevier Science Publishers, Amsterdam.
    • (2002) WRLA'02, ENTCS , vol.71
    • Ogata, K.1    Futatsugi, K.2
  • 10
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6:1998;85-128.
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.