메뉴 건너뛰기




Volumn 13, Issue 2, 2005, Pages 317-344

A decision procedure for the existence of a rank function

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN ALGEBRA; COMPUTER SYSTEMS; CRYPTOGRAPHY; DECISION MAKING; FORMAL LOGIC; FUNCTIONS; NETWORK PROTOCOLS; SECURITY OF DATA; USER INTERFACES;

EID: 14844344837     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13204     Document Type: Review
Times cited : (16)

References (23)
  • 10
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key protocol
    • G. Lowe, An attack on the Needham-Schroeder public key protocol, Information Processing Letters 56 (1995), 131-133.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 11
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C.A. Meadows, Applying formal methods to the analysis of a key management protocol, Journal of Computer Security 1(1) (1992).
    • (1992) Journal of Computer Security , vol.1 , Issue.1
    • Meadows, C.A.1
  • 14
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 85039396793 scopus 로고    scopus 로고
    • Personal communication.
    • P.Y.A. Ryan, Personal communication.
    • Ryan, P.Y.A.1
  • 19
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • S.A. Schneider, Verifying authentication protocols in CSP, IEEE TSE 24(9) (1998).
    • (1998) IEEE TSE , vol.24 , Issue.9
    • Schneider, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.