메뉴 건너뛰기




Volumn 5, Issue , 2003, Pages 1-3

Automatic Verification of Cryptographic Protocols: A Logic Programming Approach

Author keywords

Automatic verification; Cryptographic protocols; Horn clauses; Logic programming

Indexed keywords

AUTOMATIC VERIFICATION; HORN CLAUSES;

EID: 1242332714     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (15)
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols: The Spi Calculus
    • Jan. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
    • M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, Jan. 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 84958749546 scopus 로고    scopus 로고
    • From Secrecy to Authenticity in Security Protocols
    • M. Hermenegildo and G. Puebla, editors. Springer, Sept.
    • B. Blanchet. From Secrecy to Authenticity in Security Protocols. In M. Hermenegildo and G. Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, Sept. 2002.
    • (2002) 9th International Static Analysis Symposium (SAS'02), Volume 2477 of LNCS , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 13
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Dec.
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Commun. ACM, 21(12):993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.