메뉴 건너뛰기




Volumn 8, Issue 4, 2001, Pages 373-389

A framework for a Cryptographic Protocol evaluation workbench

Author keywords

Cryptographic; Formal methods; Protocols; Verification; Weakest precondition

Indexed keywords


EID: 13544265145     PISSN: 02185393     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218539301000566     Document Type: Article
Times cited : (3)

References (35)
  • 2
    • 85038705760 scopus 로고    scopus 로고
    • M. Burrows, M. Abadi and R. M. Needham, A practical study in belief and action, in Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, CA., February, 1988) M. Vardi, ed. (Morgan Kaufmann, Los Altos, California) (1988), pp. 325-342.
    • M. Burrows, M. Abadi and R. M. Needham, "A practical study in belief and action", in Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, CA., February, 1988) M. Vardi, ed. (Morgan Kaufmann, Los Altos, California) (1988), pp. 325-342.
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. C. Yao, "On the security of public key protocols", IEEE Trans. Inf. Theory IT 29 (2) (March, 1983), pp. 198-208.
    • (1983) IEEE Trans. Inf. Theory IT , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 11
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • October
    • C. A. R. Hoare, "An axiomatic basis for computer programming", Communications of the ACM 12 (10) (October, 1969).
    • (1969) Communications of the ACM , vol.12 , Issue.10
    • Hoare, C.A.R.1
  • 14
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis
    • February
    • J. K. Millen, S. C. Clark and S. B. Freedman, "The interrogator: Protocol security analysis", IEEE Trans. Sofw. eng. SE-13 (2) (February, 1987), pp. 274-288.
    • (1987) IEEE Trans. Sofw. eng , vol.SE-13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 15
    • 0024928980 scopus 로고
    • A logic of knowledge and belief for reasoning about computer security
    • Washington IEEE
    • L. Moser, "A logic of knowledge and belief for reasoning about computer security" in Proceedings of the Computer Security Foundations Workshop II, Washington (IEEE) (1989), pp. 57-63.
    • (1989) Proceedings of the Computer Security Foundations Workshop II , pp. 57-63
    • Moser, L.1
  • 16
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers", Commun. ACM 21 (12) (December, 1978), pp. 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • April
    • D. Nessett, "A critique of the Burrows, Abadi, and Needham logic", ACM Operating Systems Review 24 (2) (April, 1990), pp. 35-38.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.1
  • 21
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • January
    • D. Otwy and O. Rees, "Efficient and timely mutual authentication", Operating Systems Review 21 (1) (January, 1987), pp. 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otwy, D.1    Rees, O.2
  • 23
    • 0008354110 scopus 로고
    • Computer Science Laboratory, SRI International, Menlo Park, CA, February
    • S. Owre, N. Shankar and J. M. Rushby, PVS Tutorial (Computer Science Laboratory, SRI International, Menlo Park, CA) (February, 1993).
    • (1993) PVS Tutorial
    • Owre, S.1    Shankar, N.2    Rushby, J.M.3
  • 26
    • 84974755213 scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • P. Syverson, "Knowledge, belief, and semantics in the analysis of cryptographic protocols", Journal of Computer Security 1 (1992), pp. 317-334.
    • (1992) Journal of Computer Security , vol.1 , pp. 317-334
    • Syverson, P.1
  • 28
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • October
    • P. Syverson, "On key distribution protocols for repeated authentication", Operating Systems Review 27 (4) (October, 1993), pp. 24-30.
    • (1993) Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.1
  • 30
    • 0004096091 scopus 로고    scopus 로고
    • A method for examining cryptographic protocols
    • University of Virginia, Doctoral Thesis, January
    • B. Tjaden, "A method for examining cryptographic protocols", (University of Virginia, Doctoral Thesis) (January, 1997).
    • (1997)
    • Tjaden, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.