메뉴 건너뛰기




Volumn 2986, Issue , 2004, Pages 140-154

Compositional Analysis of Authentication Protocols

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; STATIC ANALYSIS;

EID: 21144444143     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24725-8_11     Document Type: Article
Times cited : (19)

References (28)
  • 1
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
    • (2003) Theor. Comput. Sci. , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 6
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • LNCS 2076, Springer Verlag
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of ICALP 01, volume 2076, pages 667-681. LNCS 2076, Springer Verlag, 2001.
    • (2001) Proceedings of ICALP 01 , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 13
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • Springer LNCS 1853, July
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of ICALP'00, pages 354-372. Springer LNCS 1853, July 2000.
    • (2000) Proceedings of ICALP'00 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 15
    • 0025023289 scopus 로고
    • Reasoning about Belief in Cryptographic Protocols
    • Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
    • L. Gong, R. Needham, and R. Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 17
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • IEEE Computer Society Press, 24-26 June
    • A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop -CSFW'01, pages 77-91. IEEE Computer Society Press, 24-26 June 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop -CSFW'01 , pp. 77-91
    • Gordon, A.1    Jeffrey, A.2
  • 18
    • 84948739411 scopus 로고    scopus 로고
    • Security protocol design via authentication tests
    • Cape Breton, Canada, 24-26 June IEEE Computer Society Press
    • J. Guttman. Security protocol design via authentication tests. In 15th IEEE Computer Security Foundations Workshop - CSFW'01, pages 92-103, Cape Breton, Canada, 24-26 June 2002. IEEE Computer Society Press.
    • (2002) 15th IEEE Computer Security Foundations Workshop - CSFW'01 , pp. 92-103
    • Guttman, J.1
  • 19
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Javier Thayer, F.2
  • 20
    • 0033683193 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press
    • J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. In 13th IEEE Computer Security Foundations Workshop -CSFW'00, pages 255-268, Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press.
    • 13th IEEE Computer Security Foundations Workshop -CSFW'00 , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 26
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the yahalom protocol
    • L. C. Paulson. Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security, 9(3):197-216, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 28
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. IEEE Computer, 25(3):39-51, 1992.
    • (1992) IEEE Computer , vol.25 , Issue.3 , pp. 39-51
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.