메뉴 건너뛰기




Volumn 14, Issue 10, 2003, Pages 1740-1752

Twenty years development of security protocols research

Author keywords

Analysis; Design; Formal methods; Security protocol

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 1442278656     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (45)

References (77)
  • 1
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 3
    • 0000580723 scopus 로고    scopus 로고
    • Formal analysis of authentication protocols
    • Chinese source
    • Qing SH. Formal analysis of authentication protocols. Journal of Software, 1996,7(Supplement): 107-114 (in Chinese with English abstract).
    • (1996) Journal of Software , vol.7 , Issue.SUPPL. , pp. 107-114
    • Qing, S.H.1
  • 4
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • Otway D, Rees O. Efficient and timely mutual authentication. Operating Systems Review, 1987, 21(1): 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 6
    • 0003700417 scopus 로고
    • Kerberos authentication and authorization system
    • Project Athena Technical Plan Section E.2.1, MIT
    • Miller SP, Neuman C, Schiller JI, Saltzer JH. Kerberos authentication and authorization system. Project Athena Technical Plan Section E.2.1, MIT, 1987.
    • (1987)
    • Miller, S.P.1    Neuman, C.2    Schiller, J.I.3    Saltzer, J.H.4
  • 8
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature: Version 1.0.
    • Clark J, Jacob J. A survey of authentication protocol literature: Version 1.0. 1997. http://www-users.cs.york.ac.uk/-jac/under the link Security Protocols Review.
    • (1997)
    • Clark, J.1    Jacob, J.2
  • 9
    • 0003765597 scopus 로고
    • Information technology-security techniques-entity authentication mechanisms part 2: Entity authentication using symmetric techniques
    • ISO/IEC
    • ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 2: Entity authentication using symmetric techniques. 1993.
    • (1993)
  • 10
    • 24844436122 scopus 로고
    • Integrating security in a large distributed system
    • Technical Report, CMU-CS, CMU
    • Satyanarayanan M. Integrating security in a large distributed system. Technical Report, CMU-CS, CMU, 1987. 87-179.
    • (1987) , pp. 87-179
    • Satyanarayanan, M.1
  • 11
    • 0003765597 scopus 로고
    • Information technology-security techniques-entity authentication mechanisms part 4: Entity authentication using cryptographic check functions
    • ISO/IEC
    • ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 4: Entity authentication using cryptographic check functions. 1993.
    • (1993)
  • 12
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning D, Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981, 24(8): 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 13
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Woo T, Lam S. A lesson on authentication protocol design. Operating Systems Review, 1994, 28(3): 24-37.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.1    Lam, S.2
  • 15
    • 0038824488 scopus 로고
    • An efficient and secure authentication protocol using uncertified keys
    • Kao IL, Chow R. An efficient and secure authentication protocol using uncertified keys. Operating Systems Review, 1995, 29(3): 14-21..
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 14-21
    • Kao, I.L.1    Chow, R.2
  • 16
    • 0003765597 scopus 로고
    • Information technology-security techniques-entity authentication mechanisms part 3: Entity authentication using a public key algorithm
    • ISO/IEC
    • ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 3: Entity authentication using a public key algorithm. 1995.
    • (1995)
  • 18
    • 0025522255 scopus 로고
    • Hidden assumptions in cryptographic protocols
    • Boyd C. Hidden assumptions in cryptographic protocols. Proceedings of the IEE, 1990, 137(6): 433-436.
    • (1990) Proceedings of the IEE , vol.137 , Issue.6 , pp. 433-436
    • Boyd, C.1
  • 19
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FOR
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FOR. Software-Concepts and Tools, 1996, 17: 93-102.
    • (1996) Software-Concepts and Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 21
    • 0025405980 scopus 로고
    • A critique of the burrows, Abadi and Needham logic
    • Nessett DM. A critique of the burrows, Abadi and Needham logic. ACM Operating Systems Review, 1990, 24(2): 35-38.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 24
    • 1442295999 scopus 로고    scopus 로고
    • Using CSP for protocol analysis: The Needham-Schroeder public-key protocol
    • Technical Report, CSD-TR-96-14, Royal Holloway: University of London
    • Schneider SA. Using CSP for protocol analysis: The Needham-Schroeder public-key protocol. Technical Report, CSD-TR-96-14, Royal Holloway: University of London, 1996.
    • (1996)
    • Schneider, S.A.1
  • 32
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement
    • IEEE Computer Society Press
    • Perrig A, Song D. Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2000. 64-76.
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop , pp. 64-76
    • Perrig, A.1    Song, D.2
  • 33
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Los Alamitos: IEEE Computer Society Press
    • Song D. Athena: A new efficient automatic checker for security protocol analysis. In: Proceedings of the 1999 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202.
    • (1999) Proceedings of the 1999 IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1
  • 35
    • 0029713154 scopus 로고    scopus 로고
    • What do we mean by entity authentication
    • Los Alamitos: IEEE Computer Society Press
    • Gollmann D. What do we mean by entity authentication? In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1996. 46-54.
    • (1996) Proceedings of the IEEE Symposium on Security and Privacy , pp. 46-54
    • Gollmann, D.1
  • 37
    • 84974755213 scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • Syverson P. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1992, 1(3): 317-334.
    • (1992) Journal of Computer Security , vol.1 , Issue.3 , pp. 317-334
    • Syverson, P.1
  • 41
    • 0025641513 scopus 로고
    • A logic of communication in a hostile environment
    • Los Alamitos: IEEE Computer Society Press
    • Bieber P. A Logic of Communication in a Hostile Environment. In: Proceedings of the Computer Security Foundations Workshop III. Los Alamitos: IEEE Computer Society Press, 1990. 14-22.
    • (1990) Proceedings of the Computer Security Foundations Workshop III , pp. 14-22
    • Bieber, P.1
  • 42
    • 0025694648 scopus 로고
    • Formal semantics for logics of cryptographic protocols
    • Los Alamitos: IEEE Computer Society Press
    • Syverson P. Formal semantics for logics of cryptographic protocols. In: Proceedings of the Computer Security Foundations Workshop III. Los Alamitos: IEEE Computer Society Press. 1990. 32-41.
    • (1990) Proceedings of the Computer Security Foundations Workshop III , pp. 32-41
    • Syverson, P.1
  • 43
    • 0023868045 scopus 로고
    • An axiomatic basis of trust in distributed systems
    • Los Alamitos: IEEE Computer Society Press
    • Rangan PV. An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1988. 204-211.
    • (1988) Proceedings of the 1988 Symposium on Security and Privacy , pp. 204-211
    • Rangan, P.V.1
  • 44
    • 0024928980 scopus 로고
    • A logic of knowledge and belief for reasoning about computer security
    • Los Alamitos: IEEE Computer Society Press
    • Moser L. A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II. Los Alamitos: IEEE Computer Society Press, 1989. 57-63.
    • (1989) Proceedings of the Computer Security Foundations Workshop II , pp. 57-63
    • Moser, L.1
  • 45
    • 0027266208 scopus 로고
    • Trust relationships in secure systems: A distributed authentication perspective
    • Los Alamitos: IEEE Computer Society Press
    • Yahalom R, Klein B, Beth T. Trust relationships in secure systems: A distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150-164.
    • (1993) Proceedings of the 1993 IEEE Symposium on Security and Privacy , pp. 150-164
    • Yahalom, R.1    Klein, B.2    Beth, T.3
  • 47
    • 0003850592 scopus 로고    scopus 로고
    • Theory generation for security protocols
    • Pittsburgh: Computer Science Department, Carnegie Mellon University
    • Kindred D. Theory generation for security protocols [Ph.D. Thesis]. Pittsburgh: Computer Science Department, Carnegie Mellon University, 1999.
    • (1999)
    • Kindred, D.1
  • 50
    • 0034309559 scopus 로고    scopus 로고
    • A new non-repudiation protocol
    • Chinese source
    • Qing SH. A new non-repudiation protocol. Journal of Software, 2000, 11(10): 1338-1343 (in Chinese with English abstract).
    • (2000) Journal of Software , vol.11 , Issue.10 , pp. 1338-1343
    • Qing, S.H.1
  • 51
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 52
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet key exchange protocol using the NRL protocol analyzer
    • Los Alamitos: IEEE Computer Society Press
    • Meadows C. Analysis of the Internet key exchange protocol using the NRL protocol analyzer. In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1999. 84-89.
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 84-89
    • Meadows, C.1
  • 55
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer R, Meadows C, Millen J. Three systems for cryptographic protocol analysis. Journal of Cryptology, 1994, 7(2): 251-260.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 251-260
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 56
    • 0030696539 scopus 로고    scopus 로고
    • Mechanized proofs for a recursive authentication protocol
    • Los Alamitos: IEEE Computer Society Press
    • Paulson LC. Mechanized proofs for a recursive authentication protocol. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1997. 84-94.
    • (1997) Proceedings of the 10th IEEE Computer Security Foundations Workshop , pp. 84-94
    • Paulson, L.C.1
  • 57
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, (6): 85-128.
    • (1998) Journal of Computer Security , Issue.6 , pp. 85-128
    • Paulson, L.C.1
  • 60
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Berlin: Springer-Verlag
    • Amadio R, Lugiez D. On the reachability problem in cryptographic protocols. In: Proceedings of the CONCUR. Berlin: Springer-Verlag, 2000. 380-394.
    • (2000) Proceedings of the CONCUR , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 62
    • 84958762859 scopus 로고    scopus 로고
    • The game of the name in cryptographic tables
    • Berlin: Springer-Verlag
    • Amadio R, Prasad S. The game of the name in cryptographic tables. In: Proceedings of the ASIAN'99. Berlin: Springer-Verlag, 1999. 15-26.
    • (1999) Proceedings of the ASIAN'99 , pp. 15-26
    • Amadio, R.1    Prasad, S.2
  • 63
    • 0001566477 scopus 로고    scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • Berlin: Springer-Verlag
    • Meadows C. Formal verification of cryptographic protocols: A survey. In: Advances in Cryptology, Asiacrypt'96 Proceedings. Berlin: Springer-Verlag, 1996. 135-150.
    • (1996) Advances in Cryptology, Asiacrypt'96 Proceedings , pp. 135-150
    • Meadows, C.1
  • 66
    • 0027969914 scopus 로고
    • Prudent engineering practices for cryptographic protocols
    • Los Alamitos: IEEE Computer Society Press
    • Abadi M, Needham R. Prudent engineering practices for cryptographic protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1994. 122-136.
    • (1994) Proceedings of the 1994 IEEE Symposium on Security and Privacy , pp. 122-136
    • Abadi, M.1    Needham, R.2
  • 68
    • 0003684287 scopus 로고    scopus 로고
    • CAPSL: Common authentication protocol specification language
    • Technical Report, MP 97B48, The MITRE Corporation
    • Millen JK. CAPSL: Common authentication protocol specification language. Technical Report, MP 97B48, The MITRE Corporation, 1997.
    • (1997)
    • Millen, J.K.1
  • 70
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • Syverson P. On key distribution protocols for repeated authentication. Operating Systems Review, 1993, 27(4): 24-30.
    • (1993) Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.1
  • 72
    • 0034928643 scopus 로고    scopus 로고
    • Some new attacks upon authentication protocols
    • Chinese source
    • Wang GL, Qing SH, Zhou, ZF. Some new attacks upon authentication protocols. Journal of Software, 2001, 12(6): 907-913 (in Chinese with English abstract).
    • (2001) Journal of Software , vol.12 , Issue.6 , pp. 907-913
    • Wang, G.L.1    Qing, S.H.2    Zhou, Z.F.3
  • 73
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • Los Alamitos: IEEE Computer Society Press
    • Meadows C. Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of the DARPA Information Survivability Conference and Exposition. Los Alamitos: IEEE Computer Society Press, 2000. 237-250.
    • (2000) Proceedings of the DARPA Information Survivability Conference and Exposition , pp. 237-250
    • Meadows, C.1
  • 74
    • 0029210095 scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • Los Alamitos: IEEE Computer Society Press
    • Kailar R. Reasoning about accountability in protocols for electronic commerce. In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1995. 236-250.
    • (1995) Proceedings of the IEEE Symposium on Security and Privacy , pp. 236-250
    • Kailar, R.1
  • 75
    • 0000260312 scopus 로고    scopus 로고
    • Limitations of Kailar logic
    • Chinese source
    • Zhou DC, Qing SH, Zhou ZF. Limitations of Kailar logic. Journal of Software, 1999, 10(12): 1238-1245 (in Chinese with English abstract).
    • (1999) Journal of Software , vol.10 , Issue.12 , pp. 1238-1245
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3
  • 76
    • 0035467046 scopus 로고    scopus 로고
    • A new approach for the analysis of electronic commerce protocols
    • Chinese source
    • Zhou DC, Qing SH, Zhou ZF. A new approach for the analysis of electronic commerce protocols. Journal of Software, 2001, 12(9): 1318-1328 (in Chinese with English abstract).
    • (2001) Journal of Software , vol.12 , Issue.9 , pp. 1318-1328
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3
  • 77
    • 0142124067 scopus 로고    scopus 로고
    • Design and logical analysis of security protocols
    • Chinese source
    • Qing SH. Design and logical analysis of security protocols. Journal of Software, 2003, 14(7): 1300-1309 (in Chinese with English abstract).
    • (2003) Journal of Software , vol.14 , Issue.7 , pp. 1300-1309
    • Qing, S.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.