메뉴 건너뛰기




Volumn 2808, Issue , 2003, Pages 271-290

Symmetric authentication within a simulatable cryptographic library

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; CRYPTOGRAPHY; NETWORK SECURITY; SEMANTICS;

EID: 0142250274     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39650-5_16     Document Type: Conference Paper
Times cited : (36)

References (23)
  • 12
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31–60, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 13
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79–130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 16
    • 0024665570 scopus 로고
    • Using narrowing in the analysis of key management protocols
    • C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138–147, 1989.
    • (1989) Proc. 10Th IEEE Symposium on Security & Privacy , pp. 138-147
    • Meadows, C.1
  • 17
    • 0021190844 scopus 로고
    • The interrogator: A tool for cryptographic protocol security
    • J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proc. 5th IEEE Symposium on Security & Privacy, pages 134–141, 1984.
    • (1984) Proc. 5Th IEEE Symposium on Security & Privacy , pp. 134-141
    • Millen, J.K.1
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85–128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 19
    • 85165843562 scopus 로고    scopus 로고
    • Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 1999
    • March
    • B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 1999, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000. http://www.elsevier.nl/cas/tree/store/tcs/free/noncas/pc/menu.htm.
    • (2000) Electronic Notes in Theoretical Computer Science (ENTCS)
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 21
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184–200, 2001.
    • (2001) Proc. 22Nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.