메뉴 건너뛰기




Volumn , Issue , 2003, Pages 271-280

Intruder deductions, constraint solving and insecurity decision in presence of exclusive or

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTABILITY AND DECIDABILITY; CRYPTOGRAPHY; PROBLEM SOLVING; THEOREM PROVING; AUTHENTICATION; COMPUTER SCIENCE; CONSTRAINT THEORY; POLYNOMIALS;

EID: 0042467908     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (119)

References (19)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and setbased analysis in the Dolev-Yao model
    • Proc. CONCUR '02
    • R. Amadio and W. Charatonik. On name generation and setbased analysis in the Dolev-Yao model. In Proc. CONCUR '02, volume 2421 of LNCS, pages 499-514, 2002.
    • (2002) LNCS , vol.2421 , pp. 499-514
    • Amadio, R.1    Charatonik, W.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Proc. CONCUR '00
    • R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. CONCUR '00, volume 1877 of LNCS, pages 380-394, 2000.
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 3
    • 23044525487 scopus 로고    scopus 로고
    • Combining constraint solving
    • Constraints in Computational Logics (CCL '99)
    • F. Baader and K. Schulz. Combining constraint solving. In Constraints in Computational Logics (CCL '99), volume 2002 of LNCS, pages 104-158, 2001.
    • (2001) LNCS , vol.2002 , pp. 104-158
    • Baader, F.1    Schulz, K.2
  • 4
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP '01, pages 667-681, 2001.
    • (2001) Proc. ICALP '01 , pp. 667-681
    • Boreale, M.1
  • 6
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints, and ping-pong protocols. In Proc. ICALP '01, pages 682-693, 2001.
    • (2001) Proc. ICALP '01 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 10
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • D. McAllester. Automatic recognition of tractability in inference relations. J. ACM, 40(2):284-303, 1993.
    • (1993) J. ACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.1
  • 14
    • 84957679912 scopus 로고    scopus 로고
    • Unification and matching modulo nilpotence
    • Proc. CADE-13
    • P. Narendran, Q. Guo, and D. Wolfram. Unification and matching modulo nilpotence. In Proc. CADE-13, volume 1104 of LNCS, pages 261-274, 1996.
    • (1996) LNCS , vol.1104 , pp. 261-274
    • Narendran, P.1    Guo, Q.2    Wolfram, D.3
  • 17
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 18
    • 84937708748 scopus 로고
    • Unification in a combination of arbitrary disjoint equational theories
    • M. Schmidt-Schauß. Unification in a combination of arbitrary disjoint equational theories. J. Symbolic Computation, 8(1/2):51-99, 1989.
    • (1989) J. Symbolic Computation , vol.8 , Issue.1-2 , pp. 51-99
    • Schmidt-Schauß, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.