메뉴 건너뛰기




Volumn 3404, Issue , 2005, Pages 158-169

Deciding properties of contract-signing protocols

Author keywords

[No Author keywords available]

Indexed keywords

CONTRACTS; CRYPTOGRAPHY;

EID: 24144437134     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31856-9_13     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 1
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. TCS, 290(1):695-740, 2002.
    • (2002) TCS , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.M.1    Lugiez, D.2    Vanackere, V.3
  • 5
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • ICALP 2001. Springer-Verlag
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In ICALP 2001, volume 2076 of Lecture Notes in Computer Science, pages 667-681. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 6
    • 0035751922 scopus 로고    scopus 로고
    • Inductive methods and contract-signing protocols
    • ACM Press
    • R. Chadha, M.I. Kanovich, and A.Scedrov. Inductive methods and contract-signing protocols. In CCS 2001, pages 176-185. ACM Press, 2001.
    • (2001) CCS 2001 , pp. 176-185
    • Chadha, R.1    Kanovich, M.I.2    Scedrov, A.3
  • 7
    • 4944247375 scopus 로고    scopus 로고
    • Formal analysis of multi-party contract signing
    • IEEE Computer Society Press
    • R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In CSFW-17, pages 266-279. IEEE Computer Society Press, 2004.
    • (2004) CSFW-17 , pp. 266-279
    • Chadha, R.1    Kremer, S.2    Scedrov, A.3
  • 10
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • CRYPTO'99. Springer-Verlag
    • J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In CRYPTO'99, volume 1666 of LNCS, pages 449-466. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.3
  • 11
    • 77957159140 scopus 로고    scopus 로고
    • Deciding Properties of Contract-Signing Protocols
    • CAU Kiel
    • D. Kähler, R. Küster, T. Wilke. Deciding Properties of Contract-Signing Protocols. Technical Report IFI 0409, CAU Kiel, 2004. Available from http://www.informatik.uni-kiel.de/reports/2004/0409.html
    • (2004) Technical Report , vol.IFI 0409
    • Kähler, D.1    Küster, R.2    Wilke, T.3
  • 13
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • January
    • C. Meadows. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication, 21(1):44-54, January 2003.
    • (2003) IEEE Journal on Selected Areas in Communication , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 14
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
    • (2001) CCS 2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 15
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with a finite number of sessions, composed keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 299(1-3):451-475, 2003.
    • (2003) Theoretical Computer Science , vol.299 , Issue.1-3 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 16
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J.C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2) :419-450, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.