메뉴 건너뛰기




Volumn 4, Issue 1-2, 2005, Pages 49-70

On the decidability of cryptographic protocols with open-ended data structures

Author keywords

Complexity; Cryptographic protocols; Decidability; Transducers

Indexed keywords

COMPUTABILITY AND DECIDABILITY; DATA STRUCTURES; FINITE AUTOMATA; NETWORK PROTOCOLS; SECURITY OF DATA; THEOREM PROVING; TRANSDUCERS;

EID: 14844295030     PISSN: 16155262     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10207-004-0050-z     Document Type: Article
Times cited : (4)

References (43)
  • 2
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • Brim L, Jancar P, Kretinsky M, Kucera A (eds) Springer, Berlin Heidelberg New York
    • Amadio RM, Charatonik W (2002) On name generation and set-based analysis in the Dolev-Yao model. In: Brim L, Jancar P, Kretinsky M, Kucera A (eds) 13th international conference on concurrency theory (CONCUR 2002). Springer, Berlin Heidelberg New York, 2421:499-514
    • (2002) 13th International Conference on Concurrency Theory (CONCUR 2002) , vol.2421 , pp. 499-514
    • Amadio, R.M.1    Charatonik, W.2
  • 3
    • 4244001452 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • Technical Report RR-4147, INRIA
    • Amadio RM, Lugiez D, Vanackère V (2001) On the symbolic reduction of processes with cryptographic functions. Technical Report RR-4147, INRIA
    • (2001)
    • Amadio, R.M.1    Lugiez, D.2    Vanackère, V.3
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson D (ed) 13th Annual International Cryptology Conference. Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Stinson D (ed) Advances in Cryptology - Crypto '93, 13th annual international cryptology conference. Lecture notes in computer science, vol 773. Springer, Berlin Heidelberg New York
    • (1994) Advances in Cryptology - Crypto '93 , vol.773
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • 28th International Colloquium (ICALP 2001). Lecture notes in computer science. Springer, Berlin Heidelberg New York
    • Boreale M (2001) Symbolic trace analysis of cryptographic protocols. In: Automata, languages and programming, 28th international colloquium (ICALP 2001). Lecture notes in computer science, vol 2076. Springer, Berlin Heidelberg New York, pp 667-681
    • (2001) Automata, Languages and Programming , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 11
    • 14044264137 scopus 로고    scopus 로고
    • The authentication protocol
    • Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK
    • Bull JA, Otway DJ (1997) The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK
    • (1997)
    • Bull, J.A.1    Otway, D.J.2
  • 14
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • available at
    • Clark J, Jacob J (1997) A survey of authentication protocol literature. Web Draft Version 1.0 available at http://citeseer.nj.nec.com/
    • (1997) Web Draft Version 1.0
    • Clark, J.1    Jacob, J.2
  • 15
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: First-order verification of cryptographic protocols
    • IEEE Press, New York, (2002) Goubault-Larrecq J (ed) J. Telecommun. Inf. Technol. 4:5-15
    • Cohen E (2000) TAPS: First-order verification of cryptographic protocols. In: 13th Computer Security Foundations Workshop (CSFW 2000). IEEE Press, New York, pp 144-158 (2002) Goubault-Larrecq J (ed) J Telecommun Inf Technol 4:5-15
    • (2000) 13th Computer Security Foundations Workshop (CSFW 2000) , pp. 144-158
    • Cohen, E.1
  • 17
    • 0020190170 scopus 로고
    • On the security of ping-pong protocols
    • Dolev D, Even S, Karp RM (1982) On the security of ping-pong protocols. Inf Control 55:57-68
    • (1982) Inf. Control , vol.55 , pp. 57-68
    • Dolev, D.1    Even, S.2    Karp, R.M.3
  • 18
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • Dolev D, Yao AC (1983) On the security of public-key protocols. IEEE Trans Inf Theory 29(2):198-208
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 22
    • 0005240447 scopus 로고    scopus 로고
    • A cryptographic evaluation of IPsec
    • Technical report
    • Ferguson N, Schneier B (2000) A cryptographic evaluation of IPsec. Technical report. http://www.counterpane.com/ipsec.pdf
    • (2000)
    • Ferguson, N.1    Schneier, B.2
  • 23
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • IEEE Press, New York
    • Fiore MP, Abadi M (2001) Computing symbolic models for verifying cryptographic protocols. In: 14th Computer Security Foundations Workshop (CSFW-14). IEEE Press, New York, pp 160-173
    • (2001) 14th Computer Security Foundations Workshop (CSFW-14) , pp. 160-173
    • Fiore, M.P.1    Abadi, M.2
  • 25
    • 0003603813 scopus 로고
    • Computers and intractability: A guide to the theory of NP-completeness
    • Freeman, San Francisco
    • Garey MR, Johnson DS (1979) Computers and intractability: A guide to the theory of NP-completeness. Freeman, San Francisco
    • (1979)
    • Garey, M.R.1    Johnson, D.S.2
  • 28
    • 0002548429 scopus 로고
    • The evolution of the Kerberos authentication service
    • Brazier F, Johansen D (eds) IEEE Press, New York
    • Kohl J, Neuman B, Ts'o T (1994) The evolution of the Kerberos authentication service. In: Brazier F, Johansen D (eds) Distributed open systems. IEEE Press, New York
    • (1994) Distributed Open Systems
    • Kohl, J.1    Neuman, B.2    Ts'o, T.3
  • 29
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe G (1995) An attack on the Needham-Schroeder public-key authentication protocol. Inf Process Lett 56:131-133
    • (1995) Inf. Process Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 30
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Tools and algorithms for the construction and analysis of systems (TACAS 1996). Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 31
    • 0012795935 scopus 로고    scopus 로고
    • Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
    • Degano P (ed)
    • Meadows C (2000) Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In: Degano P (ed) Proceedings of the 1st workshop on issues in the theory of security (WITS'00), pp 87-92
    • (2000) Proceedings of the 1st Workshop on Issues in the Theory of Security (WITS'00) , pp. 87-92
    • Meadows, C.1
  • 32
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Press, New York
    • Meadows C (2000) Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of DISCEX 2000. IEEE Press, New York, pp 237-250
    • (2000) Proceedings of DISCEX 2000 , pp. 237-250
    • Meadows, C.1
  • 35
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • Otway D, Rees O (1987) Efficient and timely mutual authentication. Oper Syst Rev 21(1):8-10
    • (1987) Oper. Syst. Rev. , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 37
  • 41
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • Song DX, Berezin S, Perrig A (2001) Athena: A novel approach to efficient automatic security protocol analysis. J Comput Secur 9(1/ 2):47-74
    • (2001) J. Comput. Secur. , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3
  • 43
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • Zhou J (1999) Fixing a security flaw in IKE protocols. Electron Lett 35(13):1072-1073
    • (1999) Electron. Lett. , vol.35 , Issue.13 , pp. 1072-1073
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.