메뉴 건너뛰기




Volumn 1125, Issue , 1996, Pages 61-76

Deciding cryptographic protocol adequacy with HOL: The implementation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; CRYPTOGRAPHY; FORMAL LOGIC; THEOREM PROVING;

EID: 21444442468     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0105397     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 3
    • 0029718781 scopus 로고    scopus 로고
    • A HOL extension of GNY for automatically analyzing cryptographic protocols
    • County Kerry, Ireland, June, IEEE
    • S. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In Proceedings of Computer Security Foundations Workshop IX, County Kerry, Ireland, June 1996. IEEE.
    • (1996) Proceedings of Computer Security Foundations Workshop IX
    • Brackin, S.1
  • 6
    • 0344792859 scopus 로고
    • Reasoning with inductively defined relations in the HOL theorem prover
    • University of Cambridge Computer Laboratory, Cambridge, UK, August
    • J. Camilleri and T. Melham. Reasoning with inductively defined relations in the HOL theorem prover. Technical Report 265, University of Cambridge Computer Laboratory, Cambridge, UK, August 1992.
    • (1992) Technical Report , vol.265
    • Camilleri, J.1    Melham, T.2
  • 7
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • August
    • D. Denning and G. Sacco. Timestamps in key distribution protocols. CACM, 24(8):533-536, August 1981.
    • (1981) CACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 8
    • 0142061219 scopus 로고
    • Handling infeasible specifications of cryptographic protocols
    • Pranconia NH, June, IEEE
    • L. Gong. Handling infeasible specifications of cryptographic protocols. In Proceedings of Computer Security Foundations Workshop IV, pages 99-102, Pranconia NH, June 1991. IEEE.
    • (1991) Proceedings of Computer Security Foundations Workshop IV , pp. 99-102
    • Gong, L.1
  • 12
    • 0024665570 scopus 로고
    • Using narrowing in the analysis of key management protocols
    • Oakland, CA, May, IEEE
    • C. Meadows. Using narrowing in the analysis of key management protocols. In Proceedings of the Symposium on Security and Privacy, pages 138-147, Oakland, CA, May 1989. IEEE.
    • (1989) Proceedings of the Symposium on Security and Privacy , pp. 138-147
    • Meadows, C.1
  • 13
    • 0026152198 scopus 로고
    • A system for the specification and analysis of key management protocols
    • Oakland, CA, May, IEEE
    • C. Meadows. A system for the specification and analysis of key management protocols. In Proceedings of the Symposium on Security and Privacy, pages 182-195, Oakland, CA, May 1991. IEEE.
    • (1991) Proceedings of the Symposium on Security and Privacy , pp. 182-195
    • Meadows, C.1
  • 14
    • 0342880800 scopus 로고
    • Applying formal methods to the' analysis of a key management protocol
    • C. Meadows. Applying formal methods to the' analysis of a key management protocol. J. Computer Security, 1(1):5-36, 1992.
    • (1992) J. Computer Security , vol.1 , Issue.1 , pp. 5-36
    • Meadows, C.1
  • 15
    • 0021190844 scopus 로고
    • The interrogator: A tool for cryptographic protocol analysis
    • Oakland, CA, May, IEEE
    • J. Millen. The interrogator: A tool for cryptographic protocol analysis. In Proceedings of the Symposium on Security and Privacy, pages 134-141, Oakland, CA, May 1984. IEEE.
    • (1984) Proceedings of the Symposium on Security and Privacy , pp. 134-141
    • Millen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.