메뉴 건너뛰기




Volumn 2755, Issue , 2003, Pages 268-283

The coinductive approach to verifying cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

SPECIFICATION LANGUAGES;

EID: 0346955916     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40020-2_15     Document Type: Article
Times cited : (2)

References (15)
  • 2
    • 0000523051 scopus 로고
    • A logic of authentication
    • Series A
    • M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proc. Royal Soc., Series A, Volume 426:233-271, 1989.
    • (1989) Proc. Royal Soc. , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 5
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1990.
    • (1990) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 7
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM SIGSAC, November
    • J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In 8th ACM Conference on Computer and Communication Security, pages 166-175. ACM SIGSAC, November 2001.
    • (2001) 8th ACM Conference on Computer and Communication Security , pp. 166-175
    • Millen, J.1    Shmatikov, V.2
  • 8
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 9
    • 0029251055 scopus 로고
    • Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS
    • S. Owre, J.M. Rushby, N. Shankar, and F. von Henke. Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Trans. on Softw. Eng., 21(2):107-125, 1995.
    • (1995) IEEE Trans. on Softw. Eng. , vol.21 , Issue.2 , pp. 107-125
    • Owre, S.1    Rushby, J.M.2    Shankar, N.3    Von Henke, F.4
  • 10
    • 0003724888 scopus 로고
    • Isabelle: A Generic Theorem Prover. Number 828
    • Berlin
    • L.C. Paulson. Isabelle: A Generic Theorem Prover. Number 828 in Lect. Notes Comp. Sci. Springer, Berlin, 1994.
    • (1994) Lect. Notes Comp. Sci. Springer
    • Paulson, L.C.1
  • 11
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journ. of Computer Security, 6:85-128, 1998.
    • (1998) Journ. of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.