메뉴 건너뛰기




Volumn 50, Issue 1-3, 2004, Pages 23-49

A simple framework for real-time cryptographic protocol analysis with compositional proof rules

Author keywords

Crytographic protocols; Non interference; Real time process algebra

Indexed keywords

COMPUTER SIMULATION; DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; REAL TIME SYSTEMS; SECURITY OF DATA; SEMANTICS; THEOREM PROVING;

EID: 1442311382     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2004.01.001     Document Type: Conference Paper
Times cited : (34)

References (24)
  • 1
    • 35248843428 scopus 로고    scopus 로고
    • On compositional reasoning in the Spi-calculus
    • Proc. FOSSACS'02, Springer, Berlin
    • M. Boreale, D. Gorla, On compositional reasoning in the Spi-calculus, in: Proc. FOSSACS'02, Lecture Notes in Computer Science, Vol. 2303, Springer, Berlin, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2303
    • Boreale, M.1    Gorla, D.2
  • 2
    • 84957023134 scopus 로고    scopus 로고
    • Analysing a stream authentication protocol using model checking
    • Proc. ESORICS'02, Springer, Berlin
    • P. Broadfoot, G. Lowe, Analysing a stream authentication protocol using model checking, in: Proc. ESORICS'02, Lecture Notes in Computer Science, Vol. 2502, Springer, Berlin, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2502
    • Broadfoot, P.1    Lowe, G.2
  • 4
    • 0038675422 scopus 로고    scopus 로고
    • Authenticity in a reliable protocol for mobile computing
    • ACM Press, New York, March
    • N. De Francesco, M. Petrocchi, Authenticity in a reliable protocol for mobile computing, in: Proc. 18th ACM SAC, ACM Press, New York, March 2003.
    • (2003) Proc. 18th ACM SAC
    • De Francesco, N.1    Petrocchi, M.2
  • 5
    • 84974776068 scopus 로고
    • A classification of security properties
    • Focardi R., Gorrieri R. A classification of security properties. J. Comput. Security. 3(1):1995;5-33.
    • (1995) J. Comput. Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 84974597207 scopus 로고    scopus 로고
    • Non-interference for the analysis of cryptographic protocols
    • Proc. ICALP'00, Springer, Berlin
    • R. Focardi, R. Gorrieri, F. Martinelli, Non-interference for the analysis of cryptographic protocols, in: Proc. ICALP'00, Lecture Notes in Computer Science, Vol. 1853, Springer, Berlin, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1853
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 8
  • 10
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proc. FM'99, Springer, Berlin
    • R. Focardi, F. Martinelli, A uniform approach for the definition of security properties, in: Proc. FM'99, Lecture Notes in Computer Science, Vol. 1708, Springer, Berlin, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708
    • Focardi, R.1    Martinelli, F.2
  • 11
    • 0035946056 scopus 로고    scopus 로고
    • How to sign digital streams
    • Gennaro R., Rohatgi P. How to sign digital streams. Inform. Comput. 165(1):2001;100-116.
    • (2001) Inform. Comput. , vol.165 , Issue.1 , pp. 100-116
    • Gennaro, R.1    Rohatgi, P.2
  • 12
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for real-time cryptographic protocol analysis
    • Proc. ESOP'03, Warsaw
    • R. Gorrieri, E. Locatelli, F. Martinelli, A simple language for real-time cryptographic protocol analysis, in: Proc. ESOP'03, Lecture Notes in Computer Science, Vol. 2618, Warsaw, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2618
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 13
    • 1442316809 scopus 로고    scopus 로고
    • Using compositional reasoning and non-interference for verifying integrity in digital stream protocols
    • IEEE Press, Lisbon
    • R. Gorrieri, F. Martinelli, M. Petrocchi, A. Vaccarelli, Using compositional reasoning and non-interference for verifying integrity in digital stream protocols, in: Proc. ACSD'03, IEEE Press, Lisbon, 2003.
    • (2003) Proc. ACSD'03
    • Gorrieri, R.1    Martinelli, F.2    Petrocchi, M.3    Vaccarelli, A.4
  • 15
    • 0027666919 scopus 로고
    • Transition system specifications with negative premises
    • Groote J.F. Transition system specifications with negative premises. Theoret. Comput. Sci. 118:1993;263-299.
    • (1993) Theoret. Comput. Sci. , vol.118 , pp. 263-299
    • Groote, J.F.1
  • 16
    • 0033714403 scopus 로고    scopus 로고
    • Protocol independence through disjoint encryption
    • IEEE Press, New York
    • J. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: Proc. CSFW'00, IEEE Press, New York, 2000.
    • (2000) Proc. CSFW'00
    • Guttman, J.1    Thayer, F.J.2
  • 17
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Press, New York
    • G. Lowe, A hierarchy of authentication specifications, in: Proc. CSFW'97, IEEE Press, New York, 1997.
    • (1997) Proc. CSFW'97
    • Lowe, G.1
  • 18
    • 0142187681 scopus 로고    scopus 로고
    • Compositional verification of secure streaming data: A case study with EMSS
    • Proc. ICTCS'03, Springer, Berlin
    • F. Martinelli, M. Petrocchi, A. Vaccarelli, Compositional verification of secure streaming data: a case study with EMSS, in: Proc. ICTCS'03, Lecture Notes in Computer Science, Vol. 2841, Springer, Berlin, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2841
    • Martinelli, F.1    Petrocchi, M.2    Vaccarelli, A.3
  • 20
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • IEEE Press, New York
    • A. Perrig, R. Canetti, J.D. Tygar, D.X. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proc. IEEE S & P'00, IEEE Press, New York, 2000.
    • (2000) Proc. IEEE S & P'00
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.X.4
  • 23
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time-dependent security properties in CSP using PVS
    • Proc. ESORICS, Springer, Berlin
    • S. Schneider, Analysing time-dependent security properties in CSP using PVS, in: Proc. ESORICS, Lecture Notes in Computer Science, Vol. 1895, Springer, Berlin, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895
    • Schneider, S.1
  • 24
    • 84947938368 scopus 로고    scopus 로고
    • Extending process languages with time
    • Proc. AMAST, Springer, Berlin
    • I. Ulidowski, S. Yuen, Extending process languages with time, in: Proc. AMAST, Lecture Notes in Computer Science, Vol. 1349, Springer, Berlin, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1349
    • Ulidowski, I.1    Yuen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.