메뉴 건너뛰기




Volumn 24, Issue 4, 2005, Pages 322-333

Information Assurance for security protocols

Author keywords

Accuracy; Constraint solving; Cryptographic protocol; Formal analysis; Formalism; Realism; Retaliation; Soft constraints

Indexed keywords

COMPUTER SOFTWARE; COMPUTERS; CONSTRAINT THEORY; CRYPTOGRAPHY; DECISION THEORY; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 19944376495     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.10.004     Document Type: Article
Times cited : (5)

References (39)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi Secrecy by typing in security protocols Journal of the ACM 46 5 1999 749 786
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
  • 5
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Proceedings of advances in cryptography - CRYPTO'95, D. Coppersmith Springer-Verlag
    • R. Anderson, and R.M. Needham Robustness principles for public key protocols D. Coppersmith Proceedings of advances in cryptography - CRYPTO'95 LNCS 963 1995 Springer-Verlag 236 247
    • (1995) LNCS 963 , pp. 236-247
    • Anderson, R.1    Needham, R.M.2
  • 6
    • 35048872309 scopus 로고    scopus 로고
    • Confidentiality levels and deliberate/indeliberate protocol attacks
    • Proceedings of the 10th international workshop on security protocols Cambridge, UK, B. Christianson B. Crispo W.S. Harbison M. Roe Springer
    • G. Bella, and S. Bistarelli Confidentiality levels and deliberate/indeliberate protocol attacks B. Christianson B. Crispo W.S. Harbison M. Roe Proceedings of the 10th international workshop on security protocols Cambridge, UK LNCS 2845 2002 Springer 104 119
    • (2002) LNCS 2845 , pp. 104-119
    • Bella, G.1    Bistarelli, S.2
  • 8
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • Proceedings of the 5th European symposium on research in computer security (ESORICS'98), J.-J. Quisquater Y. Deswarte C. Meadows D. Gollmann Springer-Verlag
    • G. Bella, and L.C. Paulson Kerberos version IV: inductive analysis of the secrecy goals J.-J. Quisquater Y. Deswarte C. Meadows D. Gollmann Proceedings of the 5th European symposium on research in computer security (ESORICS'98) LNCS 1485 1998 Springer-Verlag 361 375
    • (1998) LNCS 1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 10
    • 33645660287 scopus 로고    scopus 로고
    • A protocol's life after attacks
    • Proceedings of the 11th international workshop on security protocols Cambridge, UK Springer-Verlag in press
    • Bella G, Bistarelli S, Massacci F. A protocol's life after attacks. In: Proceedings of the 11th international workshop on security protocols Cambridge, UK, LNCS series. Springer-Verlag; 2003, in press.
    • (2003) LNCS Series
    • Bella, G.1    Bistarelli, S.2    Massacci, F.3
  • 12
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S.M. Bellovin, and M. Merritt Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise ACM conference on computer and communications security 1993 p. 244-50
    • (1993) ACM Conference on Computer and Communications Security
    • Bellovin, S.M.1    Merritt, M.2
  • 13
    • 29244468339 scopus 로고    scopus 로고
    • Semirings for soft constraint solving and programming
    • Springer
    • S. Bistarelli Semirings for soft constraint solving and programming LNCS 2962 2004 Springer
    • (2004) LNCS 2962
    • Bistarelli, S.1
  • 15
    • 84948412454 scopus 로고    scopus 로고
    • Soft concurrent constraint programming
    • Proceedings of the 11th European symposium on programming (ESOP'02), Springer-Verlag
    • S. Bistarelli, U. Montanari, and F. Rossi Soft concurrent constraint programming Proceedings of the 11th European symposium on programming (ESOP'02) LNCS 2305 2002 Springer-Verlag p. 53-67
    • (2002) LNCS 2305
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 24
    • 19144370194 scopus 로고    scopus 로고
    • On the verification of cryptographic protocols - A tale of two committees
    • Proceedings of the workshop on secure architectures and information flow, Elsevier Science
    • D. Gollmann On the verification of cryptographic protocols - a tale of two committees Proceedings of the workshop on secure architectures and information flow ENTCS 32 2000 Elsevier Science
    • (2000) ENTCS 32
    • Gollmann, D.1
  • 25
    • 23044519498 scopus 로고    scopus 로고
    • What is authentication?
    • Proceedings of the 7th international workshop on security protocols, B. Christianson B. Crispo J. Malcolm M. Roe Springer-Verlag
    • D. Gollmann What is authentication? B. Christianson B. Crispo J. Malcolm M. Roe Proceedings of the 7th international workshop on security protocols LNCS 1796 2000 Springer-Verlag 65 72
    • (2000) LNCS 1796 , pp. 65-72
    • Gollmann, D.1
  • 28
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Information Processing Letters 56 3 1995 131 133
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 30
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 1978 993 999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 31
  • 33
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson The inductive approach to verifying cryptographic protocols Journal of Computer Security 6 1998 85 128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 34
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • L.C. Paulson Relations between secrets: two formal analyses of the Yahalom protocol Journal of Computer Security 9 3 2001 197 216
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 36
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P.Y.A. Ryan, and S.A. Schneider An attack on a recursive authentication protocol: a cautionary tale Information Processing Letters 65 1998 Elsevier Science Publishers (North-Holland)Amsterdam
    • (1998) Information Processing Letters , vol.65
    • Ryan, P.Y.A.1    Schneider, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.