메뉴 건너뛰기




Volumn 3267, Issue , 2005, Pages 93-106

For-LySa: UML for authentication analysis

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 23944488270     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31794-4_6     Document Type: Conference Paper
Times cited : (11)

References (12)
  • 1
    • 33645393872 scopus 로고    scopus 로고
    • Website hosted by School of Informatics, University of Edinburgh, May
    • The Java edition of the Pepa workbench. Website hosted by School of Informatics, University of Edinburgh: http://homepages.inf.ed.ac.uk/s9905941/ jPEPA/, May 2004.
    • (2004) The Java Edition of the Pepa Workbench
  • 2
    • 17744392151 scopus 로고    scopus 로고
    • May. Website hosted by Informatics and Mathematical Modelling, Technical University of Denmark
    • LySa - a process calculus, http://www.imm.dtu.dk/cs_LySa, May 2004. Website hosted by Informatics and Mathematical Modelling, Technical University of Denmark.
    • (2004) LySa - A Process Calculus
  • 6
    • 0003902378 scopus 로고    scopus 로고
    • The CAPSL integrated protocol environment
    • SRI International
    • G. Denker, J. Millen, and H. Rueß. The CAPSL integrated protocol environment. Technical Report SRI-CLS-2000-02, SRI International, 2000.
    • (2000) Technical Report , vol.SRI-CLS-2000-02
    • Denker, G.1    Millen, J.2    Rueß, H.3
  • 8
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • UML 2002 - The Unified Modeling Language
    • J. Jürjens. UMLsec: Extending UML for secure systems development. In UML 2002 - The Unified Modeling Language, volume 2460 of Lecture Notes in Computer Science, pages 412-425, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 11
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.