메뉴 건너뛰기




Volumn 2808, Issue , 2003, Pages 253-270

An on-the-fly model-checker for security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 0142188052     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39650-5_15     Document Type: Conference Paper
Times cited : (122)

References (26)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Springer
    • R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. Concur’00, LNCS 1877, pp. 380–394. Springer, 2000.
    • (2000) Proc. Concur’00, LNCS , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 2
    • 85165862416 scopus 로고    scopus 로고
    • Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252
    • AVISPA: Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252, www.avispa-project.org.
    • AVISPA1
  • 3
    • 85165847085 scopus 로고    scopus 로고
    • Term Rewriting and All That. Cambridge U. Pr
    • F. Baader and T. Nipkow. Term Rewriting and All That. Cambridge U. Pr., 1998.
    • (1998)
    • Baader, F.1    Nipkow, T.2
  • 4
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • Springer
    • D. Basin. Lazy infinite-state analysis of security protocols. In Proc. CQRE’99, LNCS 1740, pp. 30–42. Springer, 1999.
    • (1999) Proc. CQRE’99, LNCS , vol.1740 , pp. 30-42
    • Basin, D.1
  • 5
    • 85165856764 scopus 로고    scopus 로고
    • An On-The-Fly Model-Checker for Security Protocol Analysis (Extended Version). Technical Report 404, ETH Zurich, Computer Science
    • D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis (Extended Version). Technical Report 404, ETH Zurich, Computer Science, 2003. http://www.inf.ethz.ch/research/publications/.
    • (2003)
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 7
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Springer
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP’01, LNCS 2076, pp. 667–681. Springer, 2001.
    • (2001) Proc. ICALP’01, LNCS , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 8
    • 84944686372 scopus 로고    scopus 로고
    • A Tool for Lazy Verification of Security Protocols
    • IEEE Computer Society Press
    • Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In Proc. ASE’01. IEEE Computer Society Press, 2001.
    • (2001) Proc. ASE’01
    • Chevalier, Y.1    Vigneron, L.2
  • 9
    • 85165855139 scopus 로고    scopus 로고
    • A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov
    • J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL: www.cs.york.ac.uk/~jac/papers/drareview.ps.gz.
    • (1997)
    • Clark, J.1    Jacob, J.2
  • 10
    • 84958742278 scopus 로고    scopus 로고
    • An Improved Constraint-Based System for the Verification of Security Protocols
    • Springer
    • R. Corin and S. Etalle. An Improved Constraint-Based System for the Verification of Security Protocols. In Proc. SAS 2002, LNCS 2477, pp. 326–341. Springer, 2002.
    • (2002) Proc. SAS 2002, LNCS , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 16
    • 0034829105 scopus 로고    scopus 로고
    • Computing Symbolic Models for Verifying Cryptographic Protocols
    • IEEE Computer Society Press
    • M. Fiore and M. Abadi. Computing Symbolic Models for Verifying Cryptographic Protocols. In Proc. CSFW’01. IEEE Computer Society Press, 2001.
    • (2001) Proc. CSFW’01
    • Fiore, M.1    Abadi, M.2
  • 18
    • 85165845167 scopus 로고    scopus 로고
    • Symmetric Security Procedures for H.510 (Mobility for H.323 Multimedia Systems and Services)
    • ITU-T Recommendation H.530: Symmetric Security Procedures for H.510 (Mobility for H.323 Multimedia Systems and Services). 2002.
    • (2002)
  • 19
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and Verifying Security Protocols
    • Springer
    • F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In Proc. LPAR 2000, LNCS 1955, pp. 131–160. Springer, 2000.
    • (2000) Proc. LPAR 2000, LNCS , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 20
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A Compiler for the Analysis of Security Protocols
    • G. Lowe. Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53–84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 22
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. CCS’01, pp. 166–175, ACM Press, 2001.
    • (2001) Proc. CCS’01 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1):85–128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.C.1
  • 26
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9:47–74, 2001.
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.