메뉴 건너뛰기




Volumn 11, Issue 4, 2003, Pages 677-721

A compositional logic for proving security properties of protocols

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC; PUBLIC KEY CRYPTOGRAPHY; RANDOM NUMBER GENERATION; SEMANTICS;

EID: 0141751776     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11407     Document Type: Conference Paper
Times cited : (90)

References (29)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Expanded version available as SRC Research Report 149 (January 1998)
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus, Information and Computation 148(1) (1999), 1-70. Expanded version available as SRC Research Report 149 (January 1998).
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 3
    • 0000523051 scopus 로고
    • A logic of authentication
    • M. Burrows, M. Abadi and R. Needham, A logic of authentication, in: Proceedings of the Royal Society, Series A 426(1871) (1989), 233-271. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8(1) (1990), 18-36.
    • (1989) Proceedings of the Royal Society, Series A , vol.426 , Issue.1871 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 4
    • 0003185332 scopus 로고
    • SRC Research Report 39 and, in a shortened form
    • M. Burrows, M. Abadi and R. Needham, A logic of authentication, in: Proceedings of the Royal Society, Series A 426(1871) (1989), 233-271. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8(1) (1990), 18-36.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.1 , pp. 18-36
  • 7
    • 84877781491 scopus 로고    scopus 로고
    • Composing strand spaces
    • FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, M. Agrawal and A. Seth, eds
    • F. Crazzolara and G. Winskel, Composing strand spaces, in: FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, M. Agrawal and A. Seth, eds, Proceedings, Volume 2556 of Lecture Notes in Computer Science, Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2556
    • Crazzolara, F.1    Winskel, G.2
  • 12
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • C.A.R. Hoare, An axiomatic basis for computer programming, Communications of the ACM 12(10) (1969), 576-580.
    • (1969) Communications of the ACM , vol.12 , Issue.10 , pp. 576-580
    • Hoare, C.A.R.1
  • 13
    • 0002798893 scopus 로고
    • A compositional protocol verification using relativized bisimulation
    • K.G. Larsen and R. Milner, A compositional protocol verification using relativized bisimulation, Information and Computation 99 (1992).
    • (1992) Information and Computation , vol.99
    • Larsen, K.G.1    Milner, R.2
  • 14
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key protocol
    • G. Lowe, An attack on the Needham-Schroeder public-key protocol, Info. Proc. Letters 56 (1995), 131-133.
    • (1995) Info. Proc. Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows, The NRL protocol analyzer: an overview, J. Logic Programming 26(2) (1996), 113-131.
    • (1996) J. Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0141546693 scopus 로고
    • Action structures
    • Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
    • R. Milner, Action structures, LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
    • (1992) LFCS Report , vol.ECS-LFCS-92-249
    • Milner, R.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 25
    • 85013569711 scopus 로고    scopus 로고
    • Categorical logic of names and abstraction in action calculi
    • D. Pavlovic, Categorical logic of names and abstraction in action calculi, Math. Structures in Comp. Sci. 7(6) (1997), 619-637.
    • (1997) Math. Structures in Comp. Sci. , vol.7 , Issue.6 , pp. 619-637
    • Pavlovic, D.1
  • 26
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • IEEE Computer Soc. Press
    • A.W. Roscoe, Modelling and verifying key-exchange protocols using CSP and FDR, in: 8th IEEE Computer Security Foundations Workshop. IEEE Computer Soc. Press, 1995, pp. 98-107.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 98-107
    • Roscoe, A.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.