메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 197-261

Security goals: Packet trajectories and strand spaces

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; CRYPTOGRAPHY; INFORMATION MANAGEMENT; INTERNET PROTOCOLS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 18444377006     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_4     Document Type: Conference Paper
Times cited : (21)

References (50)
  • 1
  • 3
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • August, 210, 212
    • Randal E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35(8):677–691, August 1986. 210, 212
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 4
    • 0000523051 scopus 로고
    • A logic of authentication
    • Series A, December, Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36. 219
    • Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society, Series A, 426(1871):233–271, December 1989. Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36. 219
    • (1871) Proceedings of the Royal Society , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 5
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • 226
    • Ulf Carlsen. Optimal privacy and authentication on a portable communications system. Operating Systems Review, 28(3):16–23, 1994. 226
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carlsen, U.1
  • 7
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • Procomet, 240
    • Edmund Clarke, Somesh Jha, and Will Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings, IFIP Working Conference on Programming Concepts and Methods (Procomet), 1998. 240
    • (1998) Proceedings, IFIP Working Conference on Programming Concepts and Methods
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 9
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • 198, 219, 251
    • D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 29:198–208, 1983. 198, 219, 251
    • (1983) IEEE Transactions on Information Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • IEEE Computer Society Press, 199, 200, 208, 209, 210
    • Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In Proceedings, 1997 IEEE Symposium on Security and Privacy, pages 120–29. IEEE Computer Society Press, May 1997. 199, 200, 208, 209, 210
    • (1997) Proceedings, 1997 IEEE Symposium on Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 13
    • 85045332695 scopus 로고    scopus 로고
    • D. Gollman, editor, ESORICS 2000: European Symposium on Research in Computer Security, LNCS. Springer Verlag, 199, 200, 203
    • Joshua D. Guttman, Amy L. Herzog, and F. Javier Thayer. Authentication and confidentiality via IPsec. In D. Gollman, editor, ESORICS 2000: European Symposium on Research in Computer Security, LNCS. Springer Verlag, 2000. 199, 200, 203
    • (2000) Authentication and Confidentiality via Ipsec
    • Guttman, J.D.1    Herzog, A.L.2    Javier Thayer, F.3
  • 16
    • 0010276593 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • To appear. 199, 224, 229, 234, 246
    • Joshua D. Guttman and F. Javier Thayer Fábrega. Authentication tests and the structure of bundles. Theoretical Computer Science, 2001. To appear. 199, 224, 229, 234, 246
    • (2001) Theoretical Computer Science
    • Guttman, J.D.1    Javier Thayer Fábrega, F.2
  • 20
    • 0033683607 scopus 로고    scopus 로고
    • Toward automatic verification of authentication protocols on an unbounded network
    • IEEE Computer Society Press, July, 240
    • James Heather and Steve Schneider. Toward automatic verification of authentication protocols on an unbounded network. In Proceedings, 13th Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. 240
    • (2000) Proceedings, 13Th Computer Security Foundations Workshop
    • Heather, J.1    Schneider, S.2
  • 21
    • 0032691953 scopus 로고    scopus 로고
    • Safe simplifying transformations for security protocols
    • IEEE Computer Society Press, 252
    • Mei Lin Hui and Gavin Lowe. Safe simplifying transformations for security protocols. In 12th Computer Security Foundations Workshop Proceedings, pages 32–43. IEEE Computer Society Press, June 1999. 252
    • (1999) 12Th Computer Security Foundations Workshop Proceedings , pp. 32-43
    • Hui, M.L.1    Lowe, G.2
  • 23
    • 84956985093 scopus 로고    scopus 로고
    • In Security Protocols, International Workshop April 1997 Proceedings, Springer-Verlag, 251
    • John Kelsey, Bruce Schneier, and David Wagner. Protocol interactions and the chosen protocol attack. In Security Protocols, International Workshop April 1997 Proceedings, pages 91–104. Springer-Verlag, 1998. 251
    • (1998) Protocol Interactions and the Chosen Protocol Attack , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 26
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • 247
    • Gavin Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3):131–136, November 1995. 247
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 27
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer Verlag, 221, 231, 247
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceeedings of tacas, volume 1055 of Lecture Notes in Computer Science, pages 147–166. Springer Verlag, 1996. 221, 231, 247
    • (1996) Proceeedings of Tacas, Volume 1055 of Lecture Notes in Computer Science , pp. 147-166
    • Lowe, G.1
  • 29
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE Computer Society Press, 236
    • Gavin Lowe. Casper: A compiler for the analysis of security protocols. In 10th Computer Security Foundations Workshop Proceedings, pages 18–30. IEEE Computer Society Press, 1997. 236
    • (1997) 10Th Computer Security Foundations Workshop Proceedings , pp. 18-30
    • Lowe, G.1
  • 30
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press, 238
    • Gavin Lowe. A hierarchy of authentication specifications. In 10th Computer Security Foundations Workshop Proceedings, pages 31–43. IEEE Computer Society Press, 1997. 238
    • (1997) 10Th Computer Security Foundations Workshop Proceedings , pp. 31-43
    • Lowe, G.1
  • 31
    • 0031634547 scopus 로고    scopus 로고
    • Toward a completeness result for model checking of security protocols
    • IEEE Computer Society Press, 252
    • Gavin Lowe. Toward a completeness result for model checking of security protocols. In 11th Computer Security Foundations Workshop Proceedings, pages 96–105. IEEE Computer Society Press, 1998. 252
    • (1998) 11Th Computer Security Foundations Workshop Proceedings , pp. 96-105
    • Lowe, G.1
  • 32
    • 85045294515 scopus 로고    scopus 로고
    • Cathy Meadows and Hilary Orman, editors, Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols. DIMACS, Rutgers University, September, 236
    • Will Marrero, Edmund Clarke, and Somesh Jha. A model checker for authentication protocols. In Cathy Meadows and Hilary Orman, editors, Proceedings of the DIMACS Workshop on Design and Verification of Security Protocols. DIMACS, Rutgers University, September 1997. 236
    • (1997) A Model Checker for Authentication Protocols
    • Marrero, W.1    Clarke, E.2    Jha, S.3
  • 35
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
    • IEEE Computer Society Press, 251
    • Catherine Meadows. Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings, 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999. 251
    • (1999) Proceedings, 1999 IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 37
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), December 1978. 220
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 220
    • Needham, R.1    Schroeder, M.2
  • 38
    • 0002088427 scopus 로고
    • A note on the use of timestamps as nonces
    • April, 248, 255
    • B. Clifford Neuman and Stuart G. Stubblebine. A note on the use of timestamps as nonces. Operating Systems Review, 27(2):10–14, April 1993. 248, 255
    • (1993) Operating Systems Review , vol.27 , Issue.2 , pp. 10-14
    • Clifford Neuman, B.1    Stubblebine, S.G.2
  • 39
    • 0030705795 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • IEEE Computer Society Press, 236
    • Lawrence C. Paulson. Proving properties of security protocols by induction. In 10th IEEE Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 236
    • (1997) 10Th IEEE Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.C.1
  • 40
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Also Report 443, Cambridge University Computer Lab. 237, 240
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998. Also Report 443, Cambridge University Computer Lab. 237, 240
    • (1998) Journal of Computer Security
    • Paulson, L.C.1
  • 41
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society Press, July, 246
    • Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. 246
    • (2000) Proceedings of the 13Th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Song, D.X.2
  • 45
    • 0011137927 scopus 로고    scopus 로고
    • A reduction for automated verification of authentication protocols
    • 252
    • Scott Stoller. A reduction for automated verification of authentication protocols. In Workshop on Formal Methods and Security Protocols, July 1999. Available at http://www.cs.indiana.edu/˜stoller/. 252
    • (1999) Workshop on Formal Methods and Security Protocols
    • Stoller, S.1
  • 47
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • 199, 224, 225, 229, 232, 234, 238
    • F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3):191–230, 1999. 199, 224, 225, 229, 232, 234, 238
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Javier Thayer Fábrega, F.1    Herzog, J.C.2    Guttman, J.D.3
  • 49
    • 0003273503 scopus 로고
    • Verifying authentication protocols: Methodology and example
    • October, 238
    • Thomas Y. C. Woo and Simon S. Lam. Verifying authentication protocols: Methodology and example. In Proc. Int. Conference on Network Protocols, October 1993. 238
    • (1993) Proc. Int. Conference on Network Protocols
    • Woo, T.Y.C.1    Lam, S.S.2
  • 50
    • 0343762482 scopus 로고    scopus 로고
    • Internet draft, November, Also named draft-ietf-secsh-architecture-01.txt. 219
    • T. Ylonen, T. Kivinen, and M. Saarinen. SSH prototcol architecture. Internet draft, November 1997. Also named draft-ietf-secsh-architecture-01.txt. 219
    • (1997) SSH Prototcol Architecture
    • Ylonen, T.1    Kivinen, T.2    Saarinen, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.