메뉴 건너뛰기




Volumn 32, Issue , 2000, Pages 101-112

Secrecy in security protocols as non interference

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTER NETWORKS; CRYPTOGRAPHY; DATA FLOW ANALYSIS; DEMODULATION; INFORMATION ANALYSIS; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 1442267745     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)00097-0     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi M., Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation. 148:(1):1999;1-70
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0032659620 scopus 로고    scopus 로고
    • CVS: A compiler for the analysis of cryptographic protocols
    • IEEE press
    • A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of CSFW'99, PAGES 203-212. IEEE press, 1999.
    • (1999) Proceedings of CSFW'99 , pp. 203-212
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 5
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3:(1):1994/1995;5-33
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 6
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • LNCS 1055
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS'96. pages 146-166. LNCS 1055, 1996.
    • (1996) Proceedings of TACAS'96 , pp. 146-166
    • Lowe, G.1
  • 11
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Rockport Massachusetts (USA), June IEEE Press
    • G. Lowe. "Towards a Completeness Result for Model Checking of Security Protocols". In Proceedings Eleventh IEEE Computer Security Foundation Workshop, (CSFW'98), Rockport Massachusetts (USA), June 1998. IEEE Press.
    • (1998) Proceedings Eleventh IEEE Computer Security Foundation Workshop, (CSFW'98)
    • Lowe, G.1
  • 13
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • World Scientific
    • F. Martinelli. Languages for description and analysis of authentication protocols. In Proceedings of ICTCS'98, pages 304-315. World Scientific, 1998.
    • (1998) Proceedings of ICTCS'98 , pp. 304-315
    • Martinelli, F.1
  • 14
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • World Scientific
    • F. martinelli. Languages for description and analysis of authentication protocols. In Proceedings of ICTCS'98, pages 304-315. World Scientific, 1998.
    • (1998) Proceedings of ICTCS'98 , pp. 304-315
    • Martinelli, F.1
  • 16
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • IEEE Press
    • S. Schneider. Formal analysis of a non-repudiation protocol. In Proceedings of CSFW'98, pages 54-65, IEEE Press, 1998.
    • (1998) Proceedings of CSFW'98 , pp. 54-65
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.