메뉴 건너뛰기




Volumn 64, Issue 2, 2005, Pages 253-284

Verifying security protocols with PVS: Widening the rank function approach

Author keywords

CSP; PVS; Rank functions; Security protocol analysis

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; FUNCTIONS; MATHEMATICAL MODELS; OPTIMIZATION; PROBLEM SOLVING;

EID: 20144370847     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2004.09.005     Document Type: Article
Times cited : (15)

References (21)
  • 3
    • 20144372297 scopus 로고    scopus 로고
    • Embedding CSP in PVS. An application to authentication protocols
    • TPHOL'97, Springer-Verlag
    • B. Dutertre, and S.A. Schneider Embedding CSP in PVS. An application to authentication protocols in: TPHOL'97 LNCS vol. 1275 1997 Springer-Verlag
    • (1997) LNCS , vol.1275
    • Dutertre, B.1    Schneider, S.A.2
  • 4
    • 20144368852 scopus 로고    scopus 로고
    • A practical introduction to using CSP and PVS to prove authentication properties of security protocols
    • N. Evans, A practical introduction to using CSP and PVS to prove authentication properties of security protocols, in: IJCAR, VERIFY'01 Workshop, 2001.
    • (2001) IJCAR, VERIFY'01 Workshop
    • Evans, N.1
  • 11
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Information Processing Letters 56 3 1995
    • (1995) Information Processing Letters , vol.56 , Issue.3
    • Lowe, G.1
  • 15
    • 20144374217 scopus 로고
    • Abstract datatypes in PVS
    • Computer Science Laboratory, SRI International
    • S. Owre, N. Shankar, Abstract datatypes in PVS, Technical report, Computer Science Laboratory, SRI International, 1993.
    • (1993) Technical Report
    • Owre, S.1    Shankar, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.