메뉴 건너뛰기




Volumn 117, Issue SPEC. ISS., 2005, Pages 153-182

Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols

Author keywords

Narrowing; Reachability; Rewriting logic; Security protocols

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL METHODS; LOGIC PROGRAMMING; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 12344293529     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.06.024     Document Type: Conference Paper
Times cited : (15)

References (42)
  • 2
    • 12344277212 scopus 로고    scopus 로고
    • Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
    • Swiss Federal Insititute of Technology, Zurich, May
    • David Basin, Sebastian Modersheim, and Luca Vigano. Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. Technical Report TR-405, Swiss Federal Insititute of Technology, Zurich, May 2003
    • (2003) Technical Report , vol.TR-405
    • Basin, D.1    Modersheim, S.2    Vigano, L.3
  • 4
    • 84957104846 scopus 로고    scopus 로고
    • Model checking lossy vector addition systems
    • Ahmed Bouajjani and Richard Mayr. Model checking lossy vector addition systems. In STACS, pages 323-333, 1999
    • (1999) STACS , pp. 323-333
    • Bouajjani, A.1    Mayr, R.2
  • 17
    • 0034911369 scopus 로고    scopus 로고
    • Well-structured transition systems everywhere!
    • Alain Finkel, and Ph. Schnoebelen Well-structured transition systems everywhere! Theoretical Computer Science 256 1 2001 63 92
    • (2001) Theoretical Computer Science , vol.256 , Issue.1 , pp. 63-92
    • Alain, F.1    Schnoebelen, Ph.2
  • 24
    • 0030640375 scopus 로고    scopus 로고
    • Solving a unification problem under constrained substitutions using tree automata
    • Y. Kaji, T. Fujiwara, and T. Kasami Solving a unification problem under constrained substitutions using tree automata Journal of Symbolic Computation 23 1 1997 79 118
    • (1997) Journal of Symbolic Computation , vol.23 , Issue.1 , pp. 79-118
    • Kaji, Y.1    Fujiwara, T.2    Kasami, T.3
  • 25
  • 29
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Catherine Meadows The NRL protocol analyzer: An overview Journal of logic programming 26 2 1996 113 131
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Catherine, M.1
  • 30
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • José Meseguer Conditional rewriting logic as a unified model of concurrency Theoretical Computer Science 96 1 1992 73 155
    • (1992) Theoretical Computer Science , vol.96 , Issue.1 , pp. 73-155
    • José, M.1
  • 31
    • 84957873927 scopus 로고    scopus 로고
    • Membership algebra as a logical framework for equational specification
    • F. Parisi-Presicce Springer LNCS 1376
    • José Meseguer Membership algebra as a logical framework for equational specification F. Parisi-Presicce Proc. WADT'97 LNCS 1376 1998 Springer 18 61
    • (1998) Proc. WADT'97 , pp. 18-61
    • José, M.1
  • 41
    • 0009953384 scopus 로고    scopus 로고
    • Rewriting logic as a unifying framework for Petri nets
    • H. Ehrig G. Juhas J. Padberg G. Rozenberg Springer-Verlag Lecture Notes in Computer Science
    • Mark-Oliver Stehr, José Meseguer, and Peter Csaba Ölveczky Rewriting logic as a unifying framework for Petri nets H. Ehrig G. Juhas J. Padberg G. Rozenberg Unifying Petri Nets Lecture Notes in Computer Science 2001 Springer-Verlag
    • (2001) Unifying Petri Nets
    • Mark-Oliver, S.1    José, M.2    Peter Csaba, Ö.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.