메뉴 건너뛰기




Volumn , Issue , 2004, Pages 23-32

Timed model checking of security protocols

Author keywords

Security protocols; Timed automata; Timed model checking

Indexed keywords

COMPUTER SIMULATION; COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; FINITE AUTOMATA; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 20444436469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029133.1029137     Document Type: Conference Paper
Times cited : (37)

References (25)
  • 1
    • 84957795309 scopus 로고    scopus 로고
    • Private authentication
    • R. Dingledine and P. F. Syverson, editors, volume LNCS 2482, San Francisco, California, Apr 2002. Springer-Verlag, Berlin
    • M. Abadi. Private authentication. In R. Dingledine and P. F. Syverson, editors, 2nd. Int. Workshop on Privacy Enhancing Technologies (PET), volume LNCS 2482, pages 27-40, San Francisco, California, Apr 2002. Springer-Verlag, Berlin.
    • 2nd. Int. Workshop on Privacy Enhancing Technologies (PET) , pp. 27-40
    • Abadi, M.1
  • 4
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium. Springer-Verlag
    • G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, volume 1485 of LNCS, pages 361-375, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
    • (1998) LNCS , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 5
    • 0000874415 scopus 로고
    • Limitations of the kerberos authentication system
    • S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. SIGCOMM Comput. Commun. Rev., 20(5):119-132, 1990.
    • (1990) SIGCOMM Comput. Commun. Rev. , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 8
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • M. V. Hermenegildo and G. Puebla, editors, volume LNCS 2477, Madrid, Spain, Sep. Springer-Verlag, Berlin
    • R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In M. V. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symp. (SAS), volume LNCS 2477, pages 326-341, Madrid, Spain, Sep 2002. Springer-Verlag, Berlin.
    • (2002) 9th Int. Static Analysis Symp. (SAS) , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 10
    • 84879482667 scopus 로고    scopus 로고
    • Proof theory, transformations, and logic programming for debugging security protocols
    • A. Pettorossi, editor, volume LNCS 2372, Paphos, Greece, Nov. Springer-Verlag, Berlin
    • G. Delzanno and S. Etalle. Proof theory, transformations, and logic programming for debugging security protocols. In A. Pettorossi, editor, 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), volume LNCS 2372, pages 76-90, Paphos, Greece, Nov 2001. Springer-Verlag, Berlin.
    • (2001) 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR) , pp. 76-90
    • Delzanno, G.1    Etalle, S.2
  • 13
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: The timing attack
    • Mar
    • E. English and S. Hamilton. Network security under siege: the timing attack. IEEE Computer, 29(3):95-97, Mar 1996.
    • (1996) IEEE Computer , vol.29 , Issue.3 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 14
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in CSP using PVS
    • Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, and Michael Waidner, editors, volume 1895 of LNCS. Springer
    • N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, and Michael Waidner, editors, ESORICS, volume 1895 of LNCS, pages 222-237. Springer, 2000.
    • (2000) ESORICS , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 17
    • 35248847052 scopus 로고    scopus 로고
    • Hiding names: Private authentication in the applied pi calculus
    • volume LNCS 2609, Tokyo, Japan, Jan. Springer-Verlag Heidelberg
    • C. Fournet and M. Abadi. Hiding names: Private authentication in the applied pi calculus. In Symp. on Software Security, volume LNCS 2609, pages 317-338, Tokyo, Japan, Jan 2003. Springer-Verlag Heidelberg.
    • (2003) Symp. on Software Security , pp. 317-338
    • Fournet, C.1    Abadi, M.2
  • 18
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for real-time cryptographic protocol analysis
    • Pierpaolo Degano, editor, volume 2618 of LNCS, Heidelberg. Springer-Verlag
    • R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In Pierpaolo Degano, editor, 12th European Symposium on Programming, ESOP 2003, volume 2618 of LNCS, pages 114-128, Heidelberg, 2003. Springer-Verlag.
    • (2003) 12th European Symposium on Programming, ESOP 2003 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 19
    • 84888255686 scopus 로고    scopus 로고
    • Probabilistic symbolic model checking with PRISM: A hybrid approach
    • J.-P. Katoen and P. Stevens, editors, (TACAS'02). Springer
    • M. Kwiatkowska, G. Norman, and D. Parker. Probabilistic symbolic model checking with PRISM: A hybrid approach. In J.-P. Katoen and P. Stevens, editors, (TACAS'02), volume 2280 of LNCS, pages 52-66. Springer, 2002.
    • (2002) LNCS , vol.2280 , pp. 52-66
    • Kwiatkowska, M.1    Norman, G.2    Parker, D.3
  • 20
    • 84976782029 scopus 로고
    • Using time instead of timeout for fault-tolerant distributed systems
    • April
    • Leslie Lamport. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems, 6(2):254-280, April 1984.
    • (1984) ACM Transactions on Programming Languages and Systems , vol.6 , Issue.2 , pp. 254-280
    • Lamport, L.1
  • 21
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • November
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, November 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 23
    • 84994742813 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press
    • G. Lowe. A hierarchy of authentication specifications. In In 10th IEEE Computer Security Foundations Workshop, page 3143. IEEE Computer Society Press, 1997.
    • (1997) 10th IEEE Computer Security Foundations Workshop , pp. 3143
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.