메뉴 건너뛰기




Volumn 128, Issue 5, 2005, Pages 55-63

Tags for multi-protocol authentication

Author keywords

Process Calculi; Security; Static Analysis

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); CRYPTOGRAPHY; LOGIC DESIGN; MOBILE COMPUTING; SECURITY SYSTEMS;

EID: 18444385411     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.11.042     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 1
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi, and B. Blanchet Secrecy types for asymmetric communication Theor. Comput. Sci. 298 3 2003 387 415
    • (2003) Theor. Comput. Sci. , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Proceedings of European Symposium on Programming (ESOP 2004) Springer-Verlag
    • M. Bugliesi, R. Focardi, and M. Maffei Compositional analysis of authentication protocols Proceedings of European Symposium on Programming (ESOP 2004) Lecture Notes in Computer Science volume 2986 2004 Springer-Verlag 140 154
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 7
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • LNCS 1853 July. Springer
    • R. Focardi, R. Gorrieri, and F. Martinelli Non interference for the analysis of cryptographic protocols Proceedings of ICALP'00 LNCS 1853 July 2000 Springer 1 12
    • (2000) Proceedings of ICALP'00 , pp. 1-12
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 8
    • 18444408644 scopus 로고    scopus 로고
    • ρ-spi calculus at work: Authentication case studies
    • Proceedings of Mefisto Project
    • R. Focardi, and M. Maffei ρ-spi calculus at work: Authentication case studies Proceedings of Mefisto Project Electronic Notes in Theoretical Computer Science 99 August 2004 268 293 Elsevier
    • (2004) Electronic Notes in Theoretical Computer Science , vol.99 , pp. 268-293
    • Focardi, R.1    Maffei, M.2
  • 10
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • (CSFW'02) 2426 June IEEE Computer Society Press
    • A. Gordon, and A. Jeffrey Types and effects for asymmetric cryptographic protocols Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW'02) 24-26 June 2002 IEEE Computer Society Press 77 91
    • (2002) Proceedings of 15th IEEE Computer Security Foundations Workshop , pp. 77-91
    • Gordon, A.1    Jeffrey, A.2
  • 15
    • 18444389709 scopus 로고    scopus 로고
    • Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer
    • to appear
    • C. Meadows and P. Syverson. Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer, 2003. to appear in Journal of Computer Security
    • (2003) Journal of Computer Security
    • Meadows, C.1    Syverson, P.2
  • 16
    • 84955583138 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • Catherine Meadows Open issues in formal methods for cryptographic protocol analysis Lecture Notes in Computer Science 2052 2001 21 36
    • (2001) Lecture Notes in Computer Science , vol.2052 , pp. 21-36
    • Catherine, M.1
  • 19
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the yahalom protocol
    • L.C. Paulson Relations between secrets: Two formal analyses of the yahalom protocol Journal of Computer Security 9 3 2001 197 216
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.