메뉴 건너뛰기




Volumn 13, Issue 3, 2005, Pages 423-482

A derivation system and compositional logic for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 24144442872     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13304     Document Type: Conference Paper
Times cited : (111)

References (64)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Expanded version available as SRC Research Report 149 (January 1998)
    • M. Abadi and A. Gordon, A calculus for cryptographic protocols: the spi calculus, Information and Computation, 148(1) (1999), 1-70. Expanded version available as SRC Research Report 149 (January 1998).
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 11
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE, Full version available
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: Proc. 42nd IEEE Symp. on the Foundations of Computer Science, IEEE, 2001. Full version available at http://eprint.iacr.org/2000/067/.
    • (2001) Proc. 42nd IEEE Symp. on the Foundations of Computer Science
    • Canetti, R.1
  • 13
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • J.A. Clark and J.L. Jacob, A survey of authentication protocol literature, Web Draft Version 1.0 available from www.cs.york.ac.uk/jac/, 1997.
    • (1997) Web Draft Version 1.0
    • Clark, J.A.1    Jacob, J.L.2
  • 14
    • 0033701785 scopus 로고    scopus 로고
    • Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
    • IEEE
    • J.A. Clark and J.L. Jacob, Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols, in: Proceedings IEEE Symposium on Research in Security and Privacy, IEEE, 2000, pp. 82-95.
    • (2000) Proceedings IEEE Symposium on Research in Security and Privacy , pp. 82-95
    • Clark, J.A.1    Jacob, J.L.2
  • 18
    • 24144437949 scopus 로고    scopus 로고
    • Secure protocol composition
    • Proceedings of 19th Annual Conference, on Mathematical Foundations of Programming Semantics
    • A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition, in: Proceedings of 19th Annual Conference, on Mathematical Foundations of Programming Semantics, Volume 83 of Electronic Notes in Theoretical Computer Science, 2004.
    • (2004) Electronic Notes in Theoretical Computer Science , vol.83
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 24
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J.C. Mitchell and D. Pavlovic, A compositional logic for proving security properties of protocols, Journal of Computer Security 11 (2003), 677-721.
    • (2003) Journal of Computer Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 27
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • D. Harkins and D. Carrel, The Internet Key Exchange (IKE), RFC 2409, 1998.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 29
    • 0038629629 scopus 로고
    • Entity authentication mechanisms - Part 3: Entity authentication using asymmetric techniques
    • ISO/IEC
    • IEEE, Entity authentication mechanisms - part 3: Entity authentication using asymmetric techniques, Technical report ISO/IEC IS 9798-3, ISO/IEC, 1993.
    • (1993) Technical Report , vol.ISO-IEC IS 9798-3
  • 31
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows and J. Millen, Three systems for cryptographic protocol analysis, J. Cryptology 7(2) (1994), 79-130.
    • (1994) J. Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 33
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key protocol
    • G. Lowe, An attack on the Needham-Schroeder public-key protocol, Info. Proc. Letters 56 (1995), 131-133.
    • (1995) Info. Proc. Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 37
    • 0036083020 scopus 로고    scopus 로고
    • On the composition of secure systems
    • Oakland, CA, USA, IEEE Computer Society
    • H. Mantel, On the composition of secure systems, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society, 2002, pp. 88-101.
    • (2002) Proceedings of the IEEE Symposium on Security and Privacy , pp. 88-101
    • Mantel, H.1
  • 39
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • Oakland, CA, USA, IEEE Computer Society
    • D. McCullough, Noninterference and the composability of security properties, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, IEEE Computer Society, 1988, pp. 177-186.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 42
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • J. McLean, A general theory of composition for a class of "possibilistic" properties, IEEE Transactions on Software Engineering 22(1) (1996), 53-67.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 44
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows, The NRL protocol analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 47
    • 0141546693 scopus 로고
    • Action structures
    • Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
    • R. Milner, Action structures, LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
    • (1992) LFCS Report , vol.ECS-LFCS-92-249
    • Milner, R.1
  • 49
    • 85013592213 scopus 로고
    • Action calculi, or syntactic action structures
    • Proceedings of MFCS'93, A.M. Borzyszkowski and S. Sokolowski, eds, Springer-Verlag
    • R. Milner, Action calculi, or syntactic action structures, in: Proceedings of MFCS'93, A.M. Borzyszkowski and S. Sokolowski, eds, Volume 711 of Lecture Notes in Computer Science, Springer-Verlag, 1993, pp. 105-121.
    • (1993) Lecture Notes in Computer Science , vol.711 , pp. 105-121
    • Milner, R.1
  • 52
    • 1442267753 scopus 로고    scopus 로고
    • A probabilistic polynomial-time calculus for the analysis of cryptographic protocols
    • Arhus, Denmark, S. Brookes and M. Mislove, eds, Electronic notes in Theoretical Computer Science, 2001
    • J.C. Mitchell, A. Ramanathan, A. Scedrov and V. Teague, A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report), in: 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, 2001, S. Brookes and M. Mislove, eds, Volume 45, Electronic notes in Theoretical Computer Science, 2001.
    • (2001) 17th Annual Conference on the Mathematical Foundations of Programming Semantics , vol.45
    • Mitchell, J.C.1    Ramanathan, A.2    Scedrov, A.3    Teague, V.4
  • 53
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 55
    • 85013569711 scopus 로고    scopus 로고
    • Categorical logic of names and abstraction in action calculi
    • D. Pavlovic, Categorical logic of names and abstraction in action calculi, Mathematical Structures in Computer Science 7(6) (1997), 619-637.
    • (1997) Mathematical Structures in Computer Science , vol.7 , Issue.6 , pp. 619-637
    • Pavlovic, D.1
  • 58
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Washington
    • B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: IEEE Symposium on Security and Privacy, Washington, 2001, pp. 184-200.
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 60
  • 61
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows, A formal language for cryptographic protocol requirements, Designs, Codes and Cryptography 7(1-2) (1996), 27-59.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.