메뉴 건너뛰기




Volumn 55, Issue 1, 2003, Pages 5-24

Towards an awareness-based semantics for security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

DATA INTEGRITY; PROTOCOL EXECUTION; SECURITY LOGICS; SECURITY PROTOCOL;

EID: 19144367628     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)00242-7     Document Type: Article
Times cited : (6)

References (19)
  • 3
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • R. Baumgart, editor LNCS 1740, Springer-Verlag, Berlin
    • Basin D., Lazy infinite-state analysis of security protocols, in: R. Baumgart, editor, Proceedings of CQRE'99, LNCS 1740, Springer-Verlag, Berlin, 1999 pp. 30-42.
    • (1999) Proceedings of CQRE'99 , pp. 30-42
    • Basin, D.1
  • 8
  • 11
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • T. Margaria and B. Steffen, editors LNCS 1055, Springer-Verlag, Berlin
    • Lowe G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, LNCS 1055, Springer-Verlag, Berlin, 1996 pp. 147-166.
    • (1996) Proceedings of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 13
    • 0003267035 scopus 로고
    • Isabelle: A generic theorem prover
    • Berlin: Springer-Verlag
    • Paulson L.C. "Isabelle: a generic theorem prover," LNCS 828. 1994;Springer-Verlag, Berlin
    • (1994) LNCS , vol.828
    • Paulson, L.C.1
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security. 6:1998;85-128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 15
    • 84974755213 scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • Syverson P.F. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security. 1:1992;317-334
    • (1992) Journal of Computer Security , vol.1 , pp. 317-334
    • Syverson, P.F.1
  • 16
    • 84924758404 scopus 로고    scopus 로고
    • Group principals and the formalization of anonymity
    • J. Wing, J. Woodcock and J. Davies, editors LNCS 1708, Springer-Verlag, Berlin
    • Syverson, P. F. and S. G. Stubblebine, Group principals and the formalization of anonymity, in: J. Wing, J. Woodcock and J. Davies, editors, Proceedings of FM'99, LNCS 1708, Springer-Verlag, Berlin, 1999 pp. 814-833.
    • (1999) Proceedings of FM'99 , pp. 814-833
    • Syverson, P.F.1    Stubblebine, S.G.2
  • 18
    • 19144364250 scopus 로고
    • On total awareness logics
    • M. de Rijke. Dordrecht: Kluwer Academic Publishers
    • Thijsse E. On total awareness logics. de Rijke M. Defaults and Diamonds. 1993;309-347 Kluwer Academic Publishers, Dordrecht
    • (1993) Defaults and Diamonds , pp. 309-347
    • Thijsse, E.1
  • 19
    • 84949768259 scopus 로고    scopus 로고
    • Formal semantics for authentication logics
    • E. Bertino, H. Kurth, G. Martella and E. Montolivo, Editors, Proceedings of ESORICS'96, Springer-Verlag, Berlin
    • Wedel G. and V. Kessler, Formal semantics for authentication logics, in: E. Bertino, H. Kurth, G. Martella and E. Montolivo, editors, Proceedings of ESORICS'96, LNCS 1146, Springer-Verlag, Berlin, 1996 pp. 219-241.
    • (1996) LNCS , vol.1146 , pp. 219-241
    • Wedel, G.1    Kessler, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.