메뉴 건너뛰기




Volumn 11, Issue 4, 2003, Pages 521-554

Logical relations for encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; THEOREM PROVING;

EID: 0141751786     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11403     Document Type: Conference Paper
Times cited : (28)

References (39)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • M. Abadi and A.D. Gordon. A bisimulation method for cryptographic protocols, Nordic Journal of Computing 5 (1998), 267-303.
    • (1998) Nordic Journal of Computing , vol.5 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • A preliminary version appeared in: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 36-47
    • M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation, 148(1) (1999), 1-70. A preliminary version appeared in: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 36-47.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 18944405475 scopus 로고    scopus 로고
    • Operational properties of Lily, a polymorphic linear lambda calculus with recursion
    • Higher Order Operational Techniques in Semantics, Elsevier Science
    • G.M. Bierman, A.M. Pitts and C.V. Russo, Operational properties of Lily, a polymorphic linear lambda calculus with recursion, in: Higher Order Operational Techniques in Semantics, Volume 41 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2000.
    • (2000) Electronic Notes in Theoretical Computer Science , vol.41
    • Bierman, G.M.1    Pitts, A.M.2    Russo, C.V.3
  • 6
    • 0000650306 scopus 로고    scopus 로고
    • Relational interpretations of recursive types in an operational setting
    • L. Birkedal and R. Harper, Relational interpretations of recursive types in an operational setting, Information and Computation 155(1-2) (1999), 3-63.
    • (1999) Information and Computation , vol.155 , Issue.1-2 , pp. 3-63
    • Birkedal, L.1    Harper, R.2
  • 7
    • 0036308321 scopus 로고    scopus 로고
    • Proof techniques for cryptographic processes, 1999
    • An extended and revised version of the paper that appeared in
    • M. Boreale. R. De Nicola and R. Pugliese, Proof techniques for cryptographic processes, 1999. ftp://rap.dsi.unifi.it/pub/papers/spi.ps.gz. An extended and revised version of the paper that appeared in 14th Annual IEEE Symposium on Logic in Computer Science. 1999, pp. 157-166.
    • (1999) 14th Annual IEEE Symposium on Logic in Computer Science , pp. 157-166
    • Boreale, M.1    De Nicola, R.2    Pugliese, R.3
  • 15
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Springer-Verlag
    • M. Hennessy and J. Riely, Information flow vs. resource access in the asynchronous pi-calculus, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Volume 1853 of Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 415-427.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 18
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1995), 131-133.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 19
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • Advances in Cryptology Asiacrypt '94, Springer-Verlag
    • C. Meadows, Formal verification of cryptographic protocols: A survey, in: Advances in Cryptology Asiacrypt '94, Volume 917 of Lecture Notes in Computer Science. Springer-Verlag, 1995, pp. 133-150.
    • (1995) Lecture Notes in Computer Science , vol.917 , pp. 133-150
    • Meadows, C.1
  • 20
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society
    • C. Meadows, Open issues in formal methods for cryptographic protocol analysis, in: DARPA Information Survivability Conference and Exposition, IEEE Computer Society, 2000, pp. 237-250.
    • (2000) DARPA Information Survivability Conference and Exposition , pp. 237-250
    • Meadows, C.1
  • 23
    • 0015561577 scopus 로고
    • Protection in programming languages
    • J.H. Morris Jr. Protection in programming languages, Communications of the ACM 16(1) (1973) 15-21.
    • (1973) Communications of the ACM , vol.16 , Issue.1 , pp. 15-21
    • Morris J.H., Jr.1
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978) 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 25
    • 0027150603 scopus 로고    scopus 로고
    • Typing and subtyping for mobile processes
    • Eighth Annual IEEE Symposium on Logic in Computer Science, 1993, pp. 376-385. Full version in
    • B. Pierce and D. Sangiorgi, Typing and subtyping for mobile processes, in: Eighth Annual IEEE Symposium on Logic in Computer Science, 1993, pp. 376-385. Full version in Mathematical Structures in Computer Science 6(5) (1996) 409-453.
    • (1996) Mathematical Structures in Computer Science , vol.6 , Issue.5 , pp. 409-453
    • Pierce, B.1    Sangiorgi, D.2
  • 27
    • 84878538793 scopus 로고    scopus 로고
    • Existential types: Logical relations and operational equivalence
    • Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Springer-Verlag
    • A.M. Pitts, Existential types: Logical relations and operational equivalence, in: Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Volume 1443 of Lecture Notes in Computer Science, Springer-Verlag, 1998, pp. 309-326.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 309-326
    • Pitts, A.M.1
  • 28
    • 0001233777 scopus 로고    scopus 로고
    • Parametric polymorphism and operational equivalence
    • A preliminary version appeared in HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, Vol. 10,1998
    • A.M. Pitts, Parametric polymorphism and operational equivalence, Mathematical Structures in Computer Science 10 (2000) 321-359. A preliminary version appeared in HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, Vol. 10,1998.
    • (2000) Mathematical Structures in Computer Science , vol.10 , pp. 321-359
    • Pitts, A.M.1
  • 29
    • 0141435071 scopus 로고    scopus 로고
    • Process calculus based upon evaluation to committed form
    • A preliminary version appeared in: CONCUR 196; Concurrency Theory, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1119, 1996, pp. 18-33.
    • A.M. Pitts and J.R.X. Ross, Process calculus based upon evaluation to committed form, Theoretical Computer Science 195 (1998), 155-182. A preliminary version appeared in: CONCUR 196; Concurrency Theory, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1119, 1996, pp. 18-33.
    • (1998) Theoretical Computer Science , vol.195 , pp. 155-182
    • Pitts, A.M.1    Ross, J.R.X.2
  • 30
    • 0003685579 scopus 로고    scopus 로고
    • Operational reasoning for functions with local state
    • Cambridge University Press
    • A.M. Pitls and I. Stark, Operational reasoning for functions with local state, in: Higher Order Operational Techniques in Semantics, Cambridge University Press, 1998, pp. 227-273.
    • (1998) Higher Order Operational Techniques in Semantics , pp. 227-273
    • Pitls, A.M.1    Stark, I.2
  • 31
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the π-calculus
    • F. Pottier, A simple view of type-secure information flow in the π-calculus, in: 15th IEEE Computer Security Foundations Workshop, 2002, pp. 320-330.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 36
    • 0003768829 scopus 로고
    • PhD thesis. University of Cambridge
    • I. Stark, Names and higher-order functions, PhD thesis. University of Cambridge, 1994. http://www.dcs.ed.ac.uk/home/stark/publications/thesis.htrnl.
    • (1994) Names and Higher-Order Functions
    • Stark, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.