메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 473-479

Role based specification and security analysis of cryptographic protocols using asynchronous product automata

Author keywords

Access protocols; Algorithm design and analysis; Authentication; Automata; Cryptographic protocols; Cryptography; Information security; Performance analysis; Power system modeling; State space methods

Indexed keywords

AUTHENTICATION; AUTOMATA THEORY; EXPERT SYSTEMS; SECURITY OF DATA; SPECIFICATIONS; STATE SPACE METHODS;

EID: 18444375513     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2002.1045943     Document Type: Conference Paper
Times cited : (12)

References (13)
  • 1
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24:533-536, 1982
    • (1982) Communications of the ACM , vol.24 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 5
    • 84882794820 scopus 로고    scopus 로고
    • Validation of cryptographic protocols by efficient automated testing
    • AAAI Press, May
    • S. Gürgens and R. Peralta. Validation of Cryptographic Protocols by Efficient Automated Testing. In FLAIRS2000, pages 7-12. AAAI Press, May 2000
    • (2000) FLAIRS2000 , pp. 7-12
    • Gürgens, S.1    Peralta, R.2
  • 6
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using CSP and FDR
    • SV
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Second International Workshop, TACAS '96, volume 1055 of LNCS, pages 147-166. SV, 1996
    • (1996) Second International Workshop, TACAS '96 Volume 1055 of LNCS , pp. 147-166
    • Lowe, G.1
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, pages 993-999, 1978
    • (1978) Communications of the ACM , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 10
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 13
    • 0035072287 scopus 로고    scopus 로고
    • Athena, a novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig. Athena, a Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security, 12(9):47-74, 2001
    • (2001) Journal of Computer Security , vol.12 , Issue.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.