메뉴 건너뛰기




Volumn 13, Issue 1, 2005, Pages 135-165

Decidability of context-explicit security protocols

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; DATA PRIVACY; NETWORK PROTOCOLS; SEMANTICS;

EID: 11944251803     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13106     Document Type: Conference Paper
Times cited : (32)

References (25)
  • 3
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R.M. Amadio, D. Lugiez and V. Vanackère, On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science 290(1) (2002), 695-740.
    • (2002) Theoretical Computer Science , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.M.1    Lugiez, D.2    Vanackère, V.3
  • 5
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • A.D. Gordon, ed., Volume 2620 of Lecture Notes in Computer Science, Springer, Berlin
    • B. Blanchet and A. Podelski, Verification of cryptographic protocols: tagging enforces termination, in: Proceedings of FoSSaCS'03, A.D. Gordon, ed., Volume 2620 of Lecture Notes in Computer Science, Springer, Berlin, 2003, pp. 136-152.
    • (2003) Proceedings of FoSSaCS'03 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 13
    • 0035067667 scopus 로고    scopus 로고
    • Fault-preserving simplifying transformations for security protocols
    • ML. Hui and G. Lowe, Fault-preserving simplifying transformations for security protocols, Journal of Computer Security 9(1, 2) (2001), 3-46.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 3-46
    • Hui, M.L.1    Lowe, G.2
  • 14
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public key protocol using FDR
    • Springer, Berlin
    • G. Lowe, Breaking and fixing the Needham-Schroeder public key protocol using FDR, in: Proceedings of TACAS'96, Volume 1055 of Lecture Notes in Computer Science, Springer, Berlin, 1996, pp. 147-166.
    • (1996) Proceedings of TACAS'96, Volume 1055 of Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 15
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security 7 (1999), 89-146.
    • (1999) Journal of Computer Security , vol.7 , pp. 89-146
    • Lowe, G.1
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 19
    • 11944263324 scopus 로고    scopus 로고
    • A decidable subclass of unbounded security protocols
    • R. Gorrieri, ed.
    • R. Ramanujam and S.P. Suresh, A decidable subclass of unbounded security protocols, in: Proceedings of WITS'03, R. Gorrieri, ed., 2003, pp. 11-20.
    • (2003) Proceedings of WITS'03 , pp. 11-20
    • Ramanujam, R.1    Suresh, S.P.2
  • 20
    • 11944256048 scopus 로고    scopus 로고
    • An equivalence on terms for security protocols
    • R. Bharadwaj, ed.
    • R. Ramanujam and S.P. Suresh, An equivalence on terms for security protocols, in: Proceedings of AVIS'03, R. Bharadwaj, ed., 2003, pp. 45-56.
    • (2003) Proceedings of AVIS'03 , pp. 45-56
    • Ramanujam, R.1    Suresh, S.P.2
  • 21
    • 35248886574 scopus 로고    scopus 로고
    • Tagging makes secrecy decidable for unbounded nonces as well
    • P.K. Pandya and J. Radhakrishnan, eds, Volume 2914 of Lecture Notes in Computer Science, Springer, Berlin
    • R. Ramanujam and S.P. Suresh, Tagging makes secrecy decidable for unbounded nonces as well, in: Proceedings of 23rd FST&TCS, P.K. Pandya and J. Radhakrishnan, eds, Volume 2914 of Lecture Notes in Computer Science, Springer, Berlin, 2003, pp. 363-374.
    • (2003) Proceedings of 23rd FST&TCS , pp. 363-374
    • Ramanujam, R.1    Suresh, S.P.2
  • 23
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • M. Rusinowitch and M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, Theoretical Computer Science, 299 (2003), 451-475.
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 24
    • 11944274424 scopus 로고    scopus 로고
    • PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November (submitted to Madras University)
    • S.P. Suresh, Foundations of security protocol analysis, PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November 2003 (submitted to Madras University).
    • (2003) Foundations of Security Protocol Analysis
    • Suresh, S.P.1
  • 25
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T.YC. Woo and S.S. Lam, A lesson on authentication protocol design, Operating Systems Review 28(3) (1994), 24-37.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.