메뉴 건너뛰기




Volumn 65, Issue 1, 2005, Pages 1-35

A symbolic decision procedure for cryptographic protocols with time stamps

Author keywords

Cryptographic protocols; Security; Timed models; Verification

Indexed keywords

CLOCKS; CONSTRAINT THEORY; CRYPTOGRAPHY; LOGIC PROGRAMMING; MATHEMATICAL MODELS; TIME DOMAIN ANALYSIS;

EID: 24144457604     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2004.09.007     Document Type: Article
Times cited : (7)

References (31)
  • 3
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • International Conference on Concurrency Theory
    • R.M. Amadio, D.Lugiez, On the reachability problem in cryptographic protocols, in: International Conference on Concurrency Theory, LNCS, vol. 1877, 2000, pp. 380-394
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 4
    • 84863900858 scopus 로고    scopus 로고
    • Mechanizing BAN Kerberos by the inductive method
    • A.J. Hu, M.Y. Vardi (Eds.), Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), Vancouver, BC, Canada, June 1998 Springer-Verlag
    • G.Bella, L.C. Paulson, Mechanizing BAN Kerberos by the inductive method, in: A.J. Hu, M.Y. Vardi (Eds.), Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), Vancouver, BC, Canada, June 1998, LNCS, Springer-Verlag, vol. 1427, pp. 416-427
    • LNCS , vol.1427 , pp. 416-427
    • Bella, G.1    Paulson, L.C.2
  • 6
    • 21844488819 scopus 로고
    • Temporal logic + timed automata: Expressiveness and decidability
    • I. Lee, S.A. Smolka (Eds.), CONCUR'95: Concurrency Theory Springer-Verlag
    • A. Bouajjani, Y. Lakhnech, Temporal logic + timed automata: expressiveness and decidability, in: I. Lee, S.A. Smolka (Eds.), CONCUR'95: Concurrency Theory, LNCS, Springer-Verlag, vol. 962, 1995, pp. 531-546
    • (1995) LNCS , vol.962 , pp. 531-546
    • Bouajjani, A.1    Lakhnech, Y.2
  • 13
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003)
    • H. Comon-Lundh, V. Cortier, New decidability results for fragments of first-order logic and application to cryptographic protocols, in: 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), LNCS, vol. 2706, 2003
    • (2003) LNCS , vol.2706
    • Comon-Lundh, H.1    Cortier, V.2
  • 16
    • 84944070422 scopus 로고    scopus 로고
    • Analyzing time dependent security properties in CSP using PVS
    • Neil Evans, and Steve Schneider Analyzing time dependent security properties in CSP using PVS ESORICS 2000 222 237
    • (2000) ESORICS , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 17
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • Washington-Brussels-Tokyo, June IEEE
    • M. Fiore, M. Abadi, Computing symbolic models for verifying cryptographic protocols, in: 14th IEEE Computer Security Foundations Workshop (CSFW '01), Washington-Brussels-Tokyo, June 2001, IEEE, pp. 160-173
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW '01) , pp. 160-173
    • Fiore, M.1    Abadi, M.2
  • 18
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • Li Gong A security risk of depending on synchronized clocks Operating Systems Review 26 1 1992 49 53
    • (1992) Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Li, G.1
  • 20
    • 0002692684 scopus 로고
    • Solving equations in abstract algebras: A rule-based survey of unification
    • Jean-Louis Lassez Gordon Plotkin MIT Press
    • J.P. Jouannaud, and C. Kirchner Solving equations in abstract algebras: a rule-based survey of unification Jean-Louis Lassez Gordon Plotkin Computational Logic Essays in Honor of Alan Robinson 1991. MIT Press
    • (1991) Computational Logic Essays in Honor of Alan Robinson
    • Jouannaud, J.P.1    Kirchner, C.2
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 1055, 1996, pp. 147-166
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 22
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • Washington-Brussels-Tokyo, June IEEE
    • G. Lowe. A hierarchy of authentication specifications, in: 10th IEEE Computer Security Foundations Workshop (CSFW '97), Washington-Brussels-Tokyo, June 1997, IEEE, pp. 31-44
    • (1997) 10th IEEE Computer Security Foundations Workshop (CSFW '97) , pp. 31-44
    • Lowe, G.1
  • 25
    • 0029713842 scopus 로고    scopus 로고
    • Intensional specification of security protocols
    • Washington-Brussels-Tokyo, June IEEE
    • A.W. Roscoe. Intensional specification of security protocols, in: 9th IEEE Computer Security Foundations Workshop (CSFW '96), Washington-Brussels- Tokyo, June 1996, IEEE, pp. 28-38
    • (1996) 9th IEEE Computer Security Foundations Workshop (CSFW '96) , pp. 28-38
    • Roscoe, A.W.1
  • 30
    • 0023327786 scopus 로고
    • Decidability of the purely existential fragment of the theory of term algebras
    • K.N. Venkataraman Decidability of the purely existential fragment of the theory of term algebras JACM 1987.
    • (1987) JACM
    • Venkataraman, K.N.1
  • 31
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T.Y.C. Woo, and S.S. Lam Authentication for distributed systems Computer 25 1 1992 39 52
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.