메뉴 건너뛰기




Volumn 2575, Issue , 2003, Pages 238-252

Formal verification of the Horn-Preneel micropayment protocol

Author keywords

[No Author keywords available]

Indexed keywords

INTELLIGENT SYSTEMS; MODEL CHECKING;

EID: 0345906741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36384-x_20     Document Type: Article
Times cited : (19)

References (16)
  • 3
    • 84944900444 scopus 로고    scopus 로고
    • Micropayments revisited
    • Progress in Cryptology-CT-RSA 2002. Springer
    • Micali, S., Rivest, R.L.; Micropayments revisited. In: Progress in Cryptology-CT-RSA 2002. LNCS 2271, Springer (2002) 149-163
    • (2002) LNCS , vol.2271 , pp. 149-163
    • Micali, S.1    Rivest, R.L.2
  • 4
    • 84958780603 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • Computer Security - ESORICS 98. Springer-Verlag
    • Horn, G., Preneel, B.; Authentication and payment in future mobile systems. In: Computer Security - ESORICS 98. LNCS 1485, Springer-Verlag (1998) 277-293
    • (1998) LNCS , vol.1485 , pp. 277-293
    • Horn, G.1    Preneel, B.2
  • 6
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe, G.; An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56 (1995) 131-133
    • (1995) Inf. Process. Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 7
    • 84855617547 scopus 로고    scopus 로고
    • CafeOBJ web page
    • CafeOBJ: CafeOBJ web page. http://www.ldl.jaist.ac.jp/cafeobj/ (2001)
    • (2001)
  • 9
    • 19044393469 scopus 로고    scopus 로고
    • Rewriting-based verification of authentication protocols
    • WRLA '02. Elsevier Science Publishers
    • Ogata, K., Futatsugi, K.; Rewriting-based verification of authentication protocols. In: WRLA '02. Volume 71 of ENTCS., Elsevier Science Publishers (2002)
    • (2002) ENTCS , vol.71
    • Ogata, K.1    Futatsugi, K.2
  • 12
    • 84978927549 scopus 로고    scopus 로고
    • Electronic payments of small amounts
    • Security Protocols. Springer-Verlag
    • Pedersen, T.P.; Electronic payments of small amounts. In: Security Protocols. LNCS 1189, Springer-Verlag (1996) 59-68
    • (1996) LNCS , vol.1189 , pp. 59-68
    • Pedersen, T.P.1
  • 13
    • 0019634370 scopus 로고
    • Passward authentication with insecure communications
    • Lamport, L.; Passward authentication with insecure communications. Comm. ACM 24 (1981) 770-772
    • (1981) Comm. ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 14
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., Yao, A.C.; On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 (1983) 198-208
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 15
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.; The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 16
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Schneider, S.; Verifying authentication protocols in CSP. IEEE Trans. Softw. Eng. 24 (1998) 741-758
    • (1998) IEEE Trans. Softw. Eng. , vol.24 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.