메뉴 건너뛰기




Volumn 71, Issue , 2004, Pages 208-222

Rewriting-based verification of authentication protocols

Author keywords

Authentication protocols; CafeOBJ; Observational transition systems; Rewriting; The NSPK protocol; Verification

Indexed keywords

ALGEBRA; ARTIFICIAL INTELLIGENCE; COMPUTER SIMULATION; CRYPTOGRAPHY; INTERNET; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 19044393469     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(05)82536-8     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 1
    • 84860943932 scopus 로고    scopus 로고
    • CafeOBJ web page. URL http://www.ldl.jaist.ac.jp/cafeobj/
    • CafeOBJ Web Page
  • 6
    • 0001858965 scopus 로고    scopus 로고
    • Behavioural coherence in object-oriented algebraic specification
    • Diaconescu R., Futatsugi K. Behavioural coherence in object-oriented algebraic specification. Universal Computer Science. 6:2000;74-96
    • (2000) Universal Computer Science , vol.6 , pp. 74-96
    • Diaconescu, R.1    Futatsugi, K.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev J.D., Yao A.C. On the security of public key protocols. IEEE Trans. Inform. Theory. IT-29:1983;198-208
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , pp. 198-208
    • Dolev, J.D.1    Yao, A.C.2
  • 13
    • 0035563205 scopus 로고    scopus 로고
    • Web-based support for cooperative software engineering
    • Goguen J.A.K. Web-based support for cooperative software engineering. Annals of Software Engineering. 12:2001;167-191
    • (2001) Annals of Software Engineering , vol.12 , pp. 167-191
    • Goguen, J.A.K.1
  • 14
    • 1842709637 scopus 로고
    • "refutational Theorem Proving using Term Rewriting Systems,"
    • University of Illinois at Champaign-Urbana
    • Hsiang J. "Refutational Theorem Proving using Term Rewriting Systems," Ph.D. thesis. 1981;University of Illinois at Champaign-Urbana
    • (1981) Ph.D. Thesis
    • Hsiang, J.1
  • 15
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56:1995;131-133
    • (1995) Inf. Process. Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR. TACAS ′96
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. TACAS ′96. LNCS 1055. 1996;147-166
    • (1996) LNCS 1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 84860940945 scopus 로고    scopus 로고
    • Maude web page. URL http://maude.csl.sri.com/
    • Maude Web Page
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Comm. ACM. 21:1978;993-999
    • (1978) Comm. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 19
    • 0346537831 scopus 로고    scopus 로고
    • Modeling and verification of distributed real-time systems based on CafeOBJ
    • Ogata K., Futatsugi K. Modeling and verification of distributed real-time systems based on CafeOBJ. ASE ′01. 2001;185-192
    • (2001) ASE ′01 , pp. 185-192
    • Ogata, K.1    Futatsugi, K.2
  • 20
    • 84891332068 scopus 로고    scopus 로고
    • Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm
    • Ogata K., Futatsugi K. Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm. FMOODS ′02. 2002;181-195
    • (2002) FMOODS ′02 , pp. 181-195
    • Ogata, K.1    Futatsugi, K.2
  • 21
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Computer Security. 6:1998;85-128
    • (1998) J. Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 22
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Schneider S. Verifying authentication protocols in CSP. IEEE Trans. on Softw. Eng. 24:1998;741-758
    • (1998) IEEE Trans. on Softw. Eng. , vol.24 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.