메뉴 건너뛰기




Volumn 11, Issue 3, 2003, Pages 399-429

A game-based verification of non-repudiation and fair exchange protocols

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATIONAL METHODS; COMPUTER SIMULATION; COMPUTER SOFTWARE; DATA COMMUNICATION SYSTEMS; FORMAL LOGIC; SECURITY OF DATA; SEMANTICS;

EID: 0037937457     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11307     Document Type: Article
Times cited : (61)

References (30)
  • 2
    • 33646178489 scopus 로고    scopus 로고
    • MOCHA: Modularity in model checking
    • in: CAV 98: Computer-aided Verification, A. Hu and M. Vardi, eds; Springer-Verlag
    • R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani and S. Tasiran, MOCHA: modularity in model checking, in: CAV 98: Computer-aided Verification, A. Hu and M. Vardi, eds, Lecture Notes in Computer Science 1427, Springer-Verlag, 1998, pp. 521-525.
    • (1998) Lecture Notes in Computer Science , vol.1427 , pp. 521-525
    • Alur, R.1    Henzinger, T.2    Mang, F.3    Qadeer, S.4    Rajamani, S.5    Tasiran, S.6
  • 9
    • 0013126638 scopus 로고
    • A logic of authentication, from proceedings of the royal society
    • IEEE Computer Society Press, 1996
    • M. Burrows, M. Abadi and R. Needham, A logic of authentication, from proceedings of the royal society, Volume 426, number 1871, 1989, in: William Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996, 1996.
    • (1989) William Stallings, Practical Cryptography for Data Internetworks , vol.426 , Issue.1871
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 11
    • 4243796648 scopus 로고
    • Relations among public key signature systems
    • Technical Report 175, Technion, Haifa, Israel, Mar.
    • S. Even and Y. Yacobi, Relations among public key signature systems, Technical Report 175, Technion, Haifa, Israel, Mar. 1980.
    • (1980)
    • Even, S.1    Yacobi, Y.2
  • 13
    • 0010569409 scopus 로고    scopus 로고
    • Optimistic non-repudiable information exchange
    • J. Biemond, ed., Werkgemeenschap Informatie- en Communicatietheorie, Enschede
    • S. Kremer and O. Markowitch, Optimistic non-repudiable information exchange, in: 21th Symp. on Information Theory in the Benelux, J. Biemond, ed., Werkgemeenschap Informatie- en Communicatietheorie, Enschede, 2000, pp. 139-146.
    • (2000) 21th Symp. on Information Theory in the Benelux , pp. 139-146
    • Kremer, S.1    Markowitch, O.2
  • 15
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1995), 131-133.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 19
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    • C.A. Meadows, Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches, Lecture Notes in Computer Science 1146 (1996), 351-365.
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 351-365
    • Meadows, C.A.1
  • 20
    • 0038562433 scopus 로고    scopus 로고
    • Certified E-mail with invisible post offices
    • S. Micali, Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 Conference, 1997.
    • RSA '97 Conference, 1997
    • Micali, S.1
  • 26
    • 0038562431 scopus 로고
    • How to exchange half a bit
    • D. Chaum, ed., Plenum Press, New York and London
    • T. Tedrick, How to exchange half a bit, in: Advances in Cryptology: Proceedings of Crypto 83, 1983, D. Chaum, ed., Plenum Press, New York and London, 1984, pp, 147-151.
    • (1984) Advances in Cryptology: Proceedings of Crypto 83, 1983 , pp. 147-151
    • Tedrick, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.