메뉴 건너뛰기




Volumn 45, Issue 11, 2003, Pages 779-790

Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols

Author keywords

Bisimulation; Cryptographic protocols; Model checking; Non interference

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; NETWORK PROTOCOLS;

EID: 0041386390     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0950-5849(03)00072-7     Document Type: Conference Paper
Times cited : (1)

References (24)
  • 2
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the Spi calculus
    • Berlin: Springer
    • Abadi M., Gordon A.D. Reasoning about cryptographic protocols in the Spi calculus, in: CONCUR'97: Concurrency Theory, vol. 1243:1997;Springer, Berlin. pp. 59-73.
    • (1997) CONCUR'97: Concurrency Theory , vol.1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The Spi calculus
    • Abadi M., Gordon A.D. A calculus for cryptographic protocols: The Spi calculus. Information and Computation. 148:(1):1999;1-70.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 0347006666 scopus 로고
    • Notes on algebraic calculi of processes
    • Logic and Models of Concurrent Systems, Berlin: Springer
    • Boudol G. Notes on algebraic calculi of processes, in: Logic and Models of Concurrent Systems, NATO ASI Series F-13. 1985;Springer, Berlin. pp. 261-303.
    • (1985) NATO ASI Series , vol.F-13 , pp. 261-303
    • Boudol, G.1
  • 10
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3:(1):1994/1995;5-33.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proceedings of World Congress on Formal Methods (FM'99), Berlin: Springer
    • Focardi R., Martinelli F. A uniform approach for the definition of security properties, in: Proceedings of World Congress on Formal Methods (FM'99), LNCS. vol. 1708:1999;Springer, Berlin.
    • (1999) LNCS , vol.1708
    • Focardi, R.1    Martinelli, F.2
  • 14
    • 0025432462 scopus 로고
    • Ccs expressions, finite state processes and three problems of equivalence
    • Kannellakis P., Smolka S. Ccs expressions, finite state processes and three problems of equivalence. Information and Computation. 86:1990;333-354.
    • (1990) Information and Computation , vol.86 , pp. 333-354
    • Kannellakis, P.1    Smolka, S.2
  • 15
    • 0041860183 scopus 로고    scopus 로고
    • A generic enemy process for the analysis of cryptoprotocols
    • S. Lafrance, J. Mullins, A generic enemy process for the analysis of cryptoprotocols, 2002, Presented at FSCBS'2002. Available at www.crac.polymtl. ca .
    • (2002) FSCBS'2002
    • Lafrance, S.1    Mullins, J.2
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS'96, Berlin: Springer
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceedings of TACAS'96, LNCS. vol. 1055:1996;Springer, Berlin, pp. 147-166.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 0003307796 scopus 로고
    • Security models
    • J. Marciniak. New York: Wiley
    • McLean J. Security models. Marciniak J. Encyclopedia of Software Engineering. 1994;1136-1145 Wiley, New York.
    • (1994) Encyclopedia of Software Engineering , pp. 1136-1145
    • McLean, J.1
  • 19
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • Mullins J. Nondeterministic admissible interference. Journal of Universal Computer Science. 6:(11):2000;1054-1070.
    • (2000) Journal of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 20
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • Oakland, CA, IEEE Computer Society, May
    • Pinsky S. Absorbing covers and intransitive non-interference, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. May 1995;IEEE Computer Society. pp. 102-113.
    • (1995) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 21
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange using CSP and FDR
    • IEEE Computer Society Press
    • Roscoe A.W. Modelling and verifying key-exchange using CSP and FDR, in: Eighth Computer Security Foundation Workshop. 1995;IEEE Computer Society Press.
    • (1995) Eighth Computer Security Foundation Workshop
    • Roscoe, A.W.1
  • 23
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • Woo T., Lam S. Authentication for distributed systems. IEEE Computer. 25:(1):1992;39-52.
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.