메뉴 건너뛰기




Volumn 99, Issue , 2004, Pages 267-293

The ρ-spi calculus at work: Authentication case studies

Author keywords

Process Calculi; Security; Static Analysis

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; FORMAL LOGIC; NETWORK PROTOCOLS; SEMANTICS;

EID: 18444408644     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.02.012     Document Type: Article
Times cited : (2)

References (30)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
    • (2003) Theor. Comput. Sci. , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 19144369108 scopus 로고
    • Programming satan's computer
    • Jan van Leeuwen, editor, Computer Science Today - Recent Trends and Developments
    • R. Anderson and R. Needham. Programming satan's computer. In Jan van Leeuwen, editor, Computer Science Today - Recent Trends and Developments, volume 1000 of LNCS, pages 426-440, 1995.
    • (1995) LNCS , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 7
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • LNCS 2076, Springer Verlag
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of lCALP 01, volume 2076, pages 667-681. LNCS 2076, Springer Verlag, 2001.
    • (2001) Proceedings of LCALP 01 , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 8
    • 0025522255 scopus 로고
    • Hidden assumptions in cryptographic protocols
    • November
    • C. Boyd. Hidden assumptions in cryptographic protocols. IEEE Proceedings, Part E, pages 433-436, November 1990.
    • (1990) IEEE Proceedings, Part E , pp. 433-436
    • Boyd, C.1
  • 11
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • July
    • U.Carlsen. Optimal privacy and authentication on a portable communications system. Operating Systems Review, 28(3):16-23, July 1994.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carlsen, U.1
  • 13
    • 84976665942 scopus 로고
    • Timestamps in key distributed protocols
    • D. Denning and G. Sacco. Timestamps in key distributed protocols. Communication of the ACM, 24(8):533-535, 1981.
    • (1981) Communication of the ACM , vol.24 , Issue.8 , pp. 533-535
    • Denning, D.1    Sacco, G.2
  • 15
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • Springer LNCS 1853, July
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of ICALP'00, pages 354-372. Springer LNCS 1853, July 2000.
    • (2000) Proceedings of ICALP'00 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 17
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • IEEE Computer Society Press, 24-26 June
    • A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 77-91. IEEE Computer Society Press, 24-26 June 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop - CSFW'01 , pp. 77-91
    • Gordon, A.1    Jeffrey, A.2
  • 18
    • 84948739411 scopus 로고    scopus 로고
    • Security protocol design via authentication tests
    • Cape Breton, Canada, 24-26 June. IEEE Computer Society Press
    • J. Guttman. Security protocol design via authentication tests. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 92-103, Cape Breton, Canada, 24-26 June 2002. IEEE Computer Society Press.
    • (2002) 15th IEEE Computer Security Foundations Workshop - CSFW'01 , pp. 92-103
    • Guttman, J.1
  • 19
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 20
    • 0033683193 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • Cambridge, UK, 3-5 July. IEEE Computer Society Press
    • J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. In 13th IEEE Computer Security Foundations Workshop - CSFW'00, pages 255-268, Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press.
    • (2000) 13th IEEE Computer Security Foundations Workshop - CSFW'00 , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 22
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer-Verlag, Berlin Germany
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 23
    • 35848959071 scopus 로고    scopus 로고
    • Using CSP to detect errors in the TMN protocol
    • October
    • G. Lowe and B. Roscoe. Using CSP to detect errors in the TMN protocol. IEEE Transaction on Software Engineering, 23(10):659-669, October 1997.
    • (1997) IEEE Transaction on Software Engineering , vol.23 , Issue.10 , pp. 659-669
    • Lowe, G.1    Roscoe, B.2
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 27
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the yahalom protocol
    • L. C. Paulson. Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security, 9(3):197-216, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 28
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • M.D. Schroeder R.M. Needham. Using encryption for authentication in large networks of computers. ACM Communication, 21(12):993-999, 1978.
    • (1978) ACM Communication , vol.21 , Issue.12 , pp. 993-999
    • Schroeder, M.D.1    Needham, R.M.2
  • 29
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Thomas Y. C. Woo and Simon S. Lam. A lesson on authentication protocol design. Operating Systems Review, 28(3):24-37, 1994.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2
  • 30
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. IEEE Computer, 25(3):39-51, 1992.
    • (1992) IEEE Computer , vol.25 , Issue.3 , pp. 39-51
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.