메뉴 건너뛰기




Volumn 125, Issue 1, 2005, Pages 91-108

An optimized intruder model for SAT-based model-checking of security protocols

Author keywords

Bounded Model Checking; Rewriting; SAT; Security Protocols

Indexed keywords

COMPUTER SCIENCE; COMPUTER SIMULATION; LARGE SCALE SYSTEMS; NETWORK PROTOCOLS; OPTIMIZATION; PROBLEM SOLVING;

EID: 14044277509     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.05.021     Document Type: Conference Paper
Times cited : (30)

References (16)
  • 1
    • 84954313527 scopus 로고    scopus 로고
    • Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
    • LNCS 2529, Springer-Verlag
    • A. Armando, and L. Compagna Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning Proceedings of FORTE 2002 LNCS 2529 2002 Springer-Verlag 210 225
    • (2002) Proceedings of FORTE 2002 , pp. 210-225
    • Armando, A.1    Compagna, L.2
  • 2
    • 35048841165 scopus 로고    scopus 로고
    • Abstraction-driven SAT-based Analysis of Security Protocols
    • LNCS 2919. Springer-Verlag
    • A. Armando, and L. Compagna Abstraction-driven SAT-based Analysis of Security Protocols Proceedings of SAT 2003 LNCS 2919 2003 Springer-Verlag Available at http://www.avispa-project.org
    • (2003) Proceedings of SAT 2003
    • Armando, A.1    Compagna, L.2
  • 3
    • 35248876774 scopus 로고    scopus 로고
    • SAT-based Model-Checking of Security Protocols using Planning Graph Analysis
    • LNCS 2805. Springer-Verlag
    • A. Armando, L. Compagna, and P. Ganty SAT-based Model-Checking of Security Protocols using Planning Graph Analysis Proceedings of FME'2003 LNCS 2805 2003 Springer-Verlag
    • (2003) Proceedings of FME'2003
    • Armando, A.1    Compagna, L.2    Ganty, P.3
  • 5
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Einar Snekkenes Dieter Gollmann, LNCS 2808, Springer-Verlag
    • D. Basin, S. Mödersheim, and L. Viganò An On-The-Fly Model-Checker for Security Protocol Analysis Einar Snekkenes Dieter Gollmann Proceedings of ESORICS'03 LNCS 2808 2003 Springer-Verlag 253 270 Available at http://www.avispa-project.org
    • (2003) Proceedings of ESORICS'03 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 6
    • 84944319371 scopus 로고    scopus 로고
    • Symbolic Model Checking without BDDs
    • W.R. Cleaveland, LNCS 1579, Springer-Verlag Berlin
    • A. Biere, A. Cimatti, E. Clarke, and Y. Zhu Symbolic Model Checking without BDDs W.R. Cleaveland Proceedings of TACAS'99 LNCS 1579 1999 Springer-Verlag Berlin 193 207
    • (1999) Proceedings of TACAS'99 , pp. 193-207
    • Biere, A.1    Cimatti, A.2    Clarke, E.3    Zhu, Y.4
  • 15
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and Verifying Security Protocols
    • M. Parigot A. Voronkov, LNCS 1955, Springer-Verlag
    • F. Jacquemard, M. Rusinowitch, and L. Vigneron Compiling and Verifying Security Protocols M. Parigot A. Voronkov Proceedings of LPAR 2000 LNCS 1955 2000 Springer-Verlag 131 160
    • (2000) Proceedings of LPAR 2000 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.