메뉴 건너뛰기




Volumn 171, Issue 1-3, 2005, Pages 189-211

Formal analysis of modern security protocols

Author keywords

Cryptographic protocols; Formal methods; Network security; Weakest preconditions

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC COMMERCE; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 13544276811     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2004.03.021     Document Type: Article
Times cited : (8)

References (23)
  • 2
    • 0040496441 scopus 로고
    • A logic of authentication
    • Digital Systems Research Center, February
    • M. Burrows, M. Abadi, R. Needham, A logic of authentication, Research Report 39, Digital Systems Research Center, February 1989
    • (1989) Research Report , vol.39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 84961760201 scopus 로고    scopus 로고
    • Automatically detecting most vulnerabilities in cryptographic protocols
    • January
    • S. Brackin, Automatically detecting most vulnerabilities in cryptographic protocols, in: DARPA Info Survivability Conf and Expo, January 2000, vol. 1, pp. 222-236
    • (2000) DARPA Info Survivability Conf and Expo , vol.1 , pp. 222-236
    • Brackin, S.1
  • 9
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • Heidelberg, Berlin: Springer Verlag
    • Kelsey J., Schneier B., Wagner D. Protocol interactions and the chosen protocol attack. Lecture Notes in Computer Science. vol. 1361:1998;91-104 Springer Verlag, Heidelberg, Berlin
    • (1998) Lecture Notes in Computer Science , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 10
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet key exchange protocol using the NRL protocol analyzer
    • C. Meadows, Analysis of the Internet key exchange protocol using the NRL protocol analyzer, IEEE Symposium on Security and Privacy, 1999
    • (1999) IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 12
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Communications of the ACM. 21(12):1978;993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 13
    • 0005489522 scopus 로고    scopus 로고
    • Inductive analysis of the Internet protocol TLS
    • Cambridge University Computer Science Laboratory
    • L.C. Paulson, Inductive analysis of the Internet protocol TLS, Technical Report 440, Cambridge University Computer Science Laboratory, 1998
    • (1998) Technical Report , vol.440
    • Paulson, L.C.1
  • 14
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Mordano, Italy, June 28-30
    • Dawn Xiaodong Song, Athena: a new efficient automatic checker for security protocol analysis, in: 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, June 28-30, 1999
    • (1999) 12th IEEE Computer Security Foundations Workshop
    • Song, D.X.1
  • 17
    • 84946432389 scopus 로고    scopus 로고
    • D. Tygar (Ed.) USENIX Workshop on Electronic Commerce USENIX
    • D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol, in: D. Tygar (Ed.), USENIX Workshop on Electronic Commerce, USENIX, 1996, pp. 29-40
    • (1996) Analysis of the SSL 3.0 Protocol , pp. 29-40
    • Wagner, D.1    Schneier, B.2
  • 20
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning D.E., Sacco G.M. Timestamps in key distribution protocols. Communications of the ACM. 24(8):1981;533-536
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 21
    • 85016462400 scopus 로고
    • Systematic design of two-party authentication protocols
    • J. Fegenbaum. Advances in Cryptography - CRYPTO '91. Berlin: Springer Verlag
    • Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R., Yung M. Systematic design of two-party authentication protocols. Fegenbaum J. Advances in Cryptography - CRYPTO '91. Lecture Notes in Computer Science. vol. 576:1992;Springer Verlag, Berlin
    • (1992) Lecture Notes in Computer Science , vol.576
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.