메뉴 건너뛰기




Volumn 1485, Issue , 1998, Pages 361-375

Kerberos version IV: Inductive analysis of the secrecy goals

Author keywords

Inductive method; Machine proof; Non expired timestamp; Secrecy; Secure key

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 22444455879     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055875     Document Type: Conference Paper
Times cited : (89)

References (20)
  • 4
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • S. M. Bellovin, M. Meritt. Limitations of the Kerberos authentication system. Computer Comm. Review, 20(5) 119-132, 1990.
    • (1990) Computer Comm. Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Meritt, M.2
  • 5
    • 0029718781 scopus 로고    scopus 로고
    • A HOL Extension of GNY for Automatically Analyzing Crypto- graphic Protocols
    • IEEE Press
    • S. H. Brackin. A HOL Extension of GNY for Automatically Analyzing Crypto- graphic Protocols. Proc. of Computer Security Foundations Workshop, IEEE Press, 1996.
    • (1996) Proc. Of Computer Security Foundations Workshop
    • Brackin, S.H.1
  • 7
    • 0002017107 scopus 로고
    • Evolving Algebras 1993: Lipari Guide
    • Oxford University Press, E. Borger
    • Y. Gurevich. Evolving Algebras 1993: Lipari Guide. In Specification and Validation Methods, Oxford University Press, E. Borger (ed.), 1995.
    • (1995) Specification and Validation Methods
    • Gurevich, Y.1
  • 8
    • 0028385109 scopus 로고
    • Three Systems for Cryptographic Protocol Analysis
    • R. Kemmerer, C. Meadows, J. Millen. Three Systems for Cryptographic Protocol Analysis. Journal of Cryptology, 7(2), 79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 13
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C. Meadows. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming, 26(2), 113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.