메뉴 건너뛰기




Volumn 125, Issue 1, 2005, Pages 67-89

Metareasoning about security protocols using distributed temporal logic

Author keywords

Authentication; Distributed temporal logic; Intruder models; Metareasoning; Protocol models; Secrecy; Security protocols

Indexed keywords

AUTHENTICATION; DISTRIBUTED SYSTEMS; DISTRIBUTED TEMPORAL LOGIC; INTRUDER MODELS; METAREASONING; PROTOCOL MODELS; SECRECY; SECURITY PROTOCOL;

EID: 14044252798     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.05.020     Document Type: Article
Times cited : (22)

References (19)
  • 1
    • 35048841165 scopus 로고    scopus 로고
    • Abstraction-driven SAT-based Analysis of Security Protocols
    • LNCS 2919. Springer-Verlag
    • A. Armando, and L. Compagna Abstraction-driven SAT-based Analysis of Security Protocols Proc. SAT 2003 LNCS 2919 2003 Springer-Verlag http://www.avispa-project.org
    • (2003) Proc. SAT 2003
    • Armando, A.1    Compagna, L.2
  • 2
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • LNCS 2808. Springer-Verlag
    • D. Basin, S. Mödersheim, and L. Viganò An On-The-Fly Model-Checker for Security Protocol Analysis Proc. ESORICS'03 LNCS 2808 2003 Springer-Verlag http://www.avispa-project.org
    • (2003) Proc. ESORICS'03
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 4
    • 84867214800 scopus 로고    scopus 로고
    • Towards a metalogic for security protocol analysis (extended abstract)
    • C. Caleiro, L. Viganò, and D. Basin. Towards a Metalogic for Security Protocol Analysis (extended abstract). In Proc. Comblog'04, 2004
    • (2004) Proc. Comblog'04
    • Caleiro, C.1    Viganò, L.2    Basin, D.3
  • 5
    • 0041498629 scopus 로고    scopus 로고
    • Automated Unbounded Verification of Security Protocols
    • LNCS 2404. Springer-Verlag
    • Y. Chevalier, and L. Vigneron Automated Unbounded Verification of Security Protocols Proc. CAV'02 LNCS 2404 2002 Springer-Verlag http://www.avispa-project.org
    • (2002) Proc. CAV'02
    • Chevalier, Y.1    Vigneron, L.2
  • 6
    • 14044275023 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • LNCS 2618. Springer-Verlag
    • H. Comon-Lundh, and V. Cortier Security properties: two agents are sufficient Proc. ESOP'2003 LNCS 2618 2003 Springer-Verlag
    • (2003) Proc. ESOP'2003
    • Comon-Lundh, H.1    Cortier, V.2
  • 7
    • 0034829261 scopus 로고    scopus 로고
    • Proving secrecy is easy enough
    • IEEE Computer Society
    • V. Cortier, J. Millen, and H. Rueß Proving secrecy is easy enough Proc. CSFW'01 2001 IEEE Computer Society
    • (2001) Proc. CSFW'01
    • Cortier, V.1    Millen, J.2    Rueß, H.3
  • 9
    • 0034144974 scopus 로고    scopus 로고
    • Specifying communication in distributed information systems
    • H.-D. Ehrich, and C. Caleiro Specifying communication in distributed information systems Acta Informatica 36 2000 591 616
    • (2000) Acta Informatica , vol.36 , pp. 591-616
    • Ehrich, H.-D.1    Caleiro, C.2
  • 10
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Shroeder Public-Key Protocol Using FDR
    • LNCS 1055. Springer-Verlag
    • G. Lowe Breaking and Fixing the Needham-Shroeder Public-Key Protocol Using FDR Proc. TACAS'96 LNCS 1055 1996 Springer-Verlag
    • (1996) Proc. TACAS'96
    • Lowe, G.1
  • 11
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press
    • G. Lowe A hierarchy of authentication specifications Proc. CSFW'97 1997 IEEE Computer Society Press
    • (1997) Proc. CSFW'97
    • Lowe, G.1
  • 13
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. Millen, and V. Shmatikov Constraint solving for bounded-process cryptographic protocol analysis Proc. CCS'01 2001 ACM Press
    • (2001) Proc. CCS'01
    • Millen, J.1    Shmatikov, V.2
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson The inductive approach to verifying cryptographic protocols Journal of Computer Security 6 1998 85 128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 16
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig Athena: a novel approach to efficient automatic security protocol analysis Journal of Computer Security 9 2001 47 74
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.