메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 637-643

On different approaches to establish the security of cryptographic protocols

Author keywords

Authentication; Mobile security; Protocol verification; Security protocols; Verification logics

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; LOGIC DESIGN; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 1642319729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 2
    • 0033725848 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • Horn, G. and Preneel, H., "Authentication and payment in future mobile systems", Journal of Computer Security, Vol. 8, No 2/3, 2000, pp.183-207
    • (2000) Journal of Computer Security , vol.8 , Issue.2-3 , pp. 183-207
    • Horn, G.1    Preneel, H.2
  • 3
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Gold Coast, Australia, December
    • Wong, D.S. and Chan, A. H. "Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices." ASIACRYPT 2001, Gold Coast, Australia, December 2001
    • (2001) ASIACRYPT 2001
    • Wong, D.S.1    Chan, A.H.2
  • 4
    • 0031234695 scopus 로고    scopus 로고
    • On certificate based security protocols for wireless communication systems
    • Park, C.S., "On Certificate Based Security Protocols for Wireless Communication Systems." IEEE Network, Vol. 11, No. 5, 1997, pp. 50-55
    • (1997) IEEE Network , vol.11 , Issue.5 , pp. 50-55
    • Park, C.S.1
  • 5
    • 0002360599 scopus 로고    scopus 로고
    • An optimised protocol for mobile network authentication and security
    • Yi, X., Okamoto, E. and Lam, K. Y., "An Optimised Protocol for Mobile Network Authentication and Security." Mobile Computing and Communications Review, Vol.2, No.3, 1998, pp. 37-39
    • (1998) Mobile Computing and Communications Review , vol.2 , Issue.3 , pp. 37-39
    • Yi, X.1    Okamoto, E.2    Lam, K.Y.3
  • 6
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Horn, G., Martin, K. and Mitchell, C., "Authentication Protocols for Mobile Network Environment Value-added Services", IEEE Transactions on Vehicular Technology, Vol. 51, No. 2, 2002, pp. 383-392
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , Issue.2 , pp. 383-392
    • Horn, G.1    Martin, K.2    Mitchell, C.3
  • 7
    • 0002360599 scopus 로고    scopus 로고
    • Comments on an optimized protocol for mobile network authentication and security
    • Martin, K.M. and Mitchell, C.J., "Comments on an optimized protocol for mobile network authentication and security", ACM Mobile Computing and Communications Review, Vol. 3, No. 2, 1999, p. 37
    • (1999) ACM Mobile Computing and Communications Review , vol.3 , Issue.2 , pp. 37
    • Martin, K.M.1    Mitchell, C.J.2
  • 9
    • 0017985798 scopus 로고
    • General techniques for communications protocol validation
    • West, C. H., "General Techniques for Communications Protocol Validation." IBM Journal of Research and Development, Vol. 22, No. 4, 1978, pp. 393-404
    • (1978) IBM Journal of Research and Development , vol.22 , Issue.4 , pp. 393-404
    • West, C.H.1
  • 10
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L. C., "The Inductive Approach to Verifying Cryptographic Protocols", Journal of Computer Security, Vol. 6, 1998, pp. 85-128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 11
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • Kemmerer, R.A. "Analyzing Encryption Protocols using Formal Verification Techniques." IEEE Journal on Selected Areas in Communications, Vol. 7, No. 4, 1989, pp. 448-457
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 15
    • 84961760201 scopus 로고    scopus 로고
    • Automatically detecting most vulnerabilities in cryptographic protocols
    • IEEE CS Press
    • Brackin, S., "Automatically Detecting Most Vulnerabilities in Cryptographic Protocols." DARPA Information Survivability Conference and Exposition, IEEE CS Press, Volume 1, 2000, pp.222-236
    • (2000) DARPA Information Survivability Conference and Exposition , vol.1 , pp. 222-236
    • Brackin, S.1
  • 16
    • 28144456308 scopus 로고
    • An attack on the needham schroeder public-key authentication protocol
    • Lowe, G., "An Attack on the Needham Schroeder Public-Key Authentication Protocol", Information Processing Letters, Vol. 56, No. 3, 1995, pp. 131-133
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.