메뉴 건너뛰기




Volumn 7, Issue 1, 2005, Pages 84-109

ENDL: A logical framework for verifying secure transaction protocols

Author keywords

Confidentiality; Electronic commerce; Integrity; Secure transaction protocol; Security; Verification

Indexed keywords

DATA PRIVACY; ELECTRONIC COMMERCE; VERIFICATION;

EID: 20344364418     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-003-0127-4     Document Type: Article
Times cited : (7)

References (32)
  • 2
    • 0034138322 scopus 로고    scopus 로고
    • The verification logic for secure electronic protocols
    • Bai S, Chen QF (2002) The verification logic for secure electronic protocols. J Software (China) 11(2):213-221
    • (2002) J. Software (China) , vol.11 , Issue.2 , pp. 213-221
    • Bai, S.1    Chen, Q.F.2
  • 4
    • 0022015288 scopus 로고
    • Secure communications using remote procedure calls
    • Birrell A (1985) Secure communications using remote procedure calls. ACM Trans Comput Syst 3(1):1-14
    • (1985) ACM Trans. Comput. Syst. , vol.3 , Issue.1 , pp. 1-14
    • Birrell, A.1
  • 5
    • 0029718781 scopus 로고    scopus 로고
    • A HOL extension of GNY for automatically analyzing cryptographic protocols
    • IEEE Computer Society Press
    • Brackin S (1996) A HOL extension of GNY for automatically analyzing cryptographic protocols. In: Proceeding of the Ninth IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, pp 62-76
    • (1996) Proceeding of the Ninth IEEE Computer Security Foundations Workshop , pp. 62-76
    • Brackin, S.1
  • 8
    • 84976665942 scopus 로고
    • Timestamp in key distribution protocols
    • Denning D, Sacco G (1981) Timestamp in key distribution protocols. Commun ACM 24(8):533-536
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 9
    • 20344382220 scopus 로고    scopus 로고
    • Dierks T, Allen C (1999) http://www.ietf.org/rfc/rfc2246.txt
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 10
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198-208
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 12
    • 20344390716 scopus 로고    scopus 로고
    • Forrester (1998) http://www.forrester.com/ER/research
    • (1998)
    • Forrester1
  • 13
    • 0142061219 scopus 로고
    • Handling infeasible specifications of cryptographic protocols
    • Franconia, NH
    • Gong L (1991) Handling infeasible specifications of cryptographic protocols. In: Proceedings of Computer Security Foundations Workshop IV, Franconia, NH, pp 99-102
    • (1991) Proceedings of Computer Security Foundations Workshop IV , pp. 99-102
    • Gong, L.1
  • 16
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • Gong L (1992) A security risk of depending on synchronized clocks. ACM Oper Syst Rev 26(1):49-53
    • (1992) ACM Oper. Syst. Rev. , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 17
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • Gritzalis S (1999) Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Comput Commun 22(8):695-707
    • (1999) Comput. Commun. , vol.22 , Issue.8 , pp. 695-707
    • Gritzalis, S.1
  • 18
    • 84883891962 scopus 로고    scopus 로고
    • Enhancing privacy and trust in electronic communities
    • Huberman B, Franklin M, Hogg T (1999) Enhancing privacy and trust in electronic communities. Proc ACM e-Commerce 99:78-86
    • (1999) Proc. ACM E-Commerce , vol.99 , pp. 78-86
    • Huberman, B.1    Franklin, M.2    Hogg, T.3
  • 19
    • 20344394066 scopus 로고    scopus 로고
    • ITU-T ITU-T X.509 The Directory - An Authentication Framework. ITU-T
    • ITU-T ITU-T X.509 (1998) The Directory - An Authentication Framework. ITU-T
    • (1998)
  • 20
    • 0029210095 scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • IEEE Computer Society Press, Los Alamitos, CA
    • Kailar R (1995) Reasoning about accountability in protocols for electronic commerce. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, pp 236-250
    • (1995) Proceedings of the 1995 IEEE Symposium on Security and Privacy , pp. 236-250
    • Kailar, R.1
  • 21
    • 85063336121 scopus 로고
    • AUTLOG - An advanced logic of authentication
    • Los Alamitors. IEEE Computer Society Press, Los Alamitos, CA
    • Kessler V, Wedel G (1994) AUTLOG - An advanced logic of authentication. In: Proceedings of the 7th IEEE Computer Security Foundations Workshop, Los Alamitors. IEEE Computer Society Press, Los Alamitos, CA, pp 90-99
    • (1994) Proceedings of the 7th IEEE Computer Security Foundations Workshop , pp. 90-99
    • Kessler, V.1    Wedel, G.2
  • 23
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An overview
    • Meadows C (1996) The NRL Protocol Analyzer: An overview. J Logic Program 26(2):113-131
    • (1996) J. Logic. Program. , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 24
    • 84958035071 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • Hirschfeld R. (ed) Lecture Notes in Computer Science Springer-Verlag, Berlin
    • Meadows C, Syverson P (1998) A formal specification of requirements for payment transactions in the SET protocol. In: Hirschfeld R (ed) Proceedings of Financial Cryptography 98. Lecture Notes in Computer Science 1465:122-140. Springer-Verlag, Berlin
    • (1998) Proceedings of Financial Cryptography 98 , vol.1465 , pp. 122-140
    • Meadows, C.1    Syverson, P.2
  • 26
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R, Schroeder M (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993-999
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 27
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman B, Ts'o T (1994) Kerberos: An authentication service for computer networks. IEEE Commun 32(9):33-38
    • (1994) IEEE Commun. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.