메뉴 건너뛰기




Volumn 58, Issue 1-2, 2005, Pages 3-27

Computer-assisted verification of a protocol for certified email

Author keywords

Protocol formal analysis; Security protocols

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 24344493908     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2005.02.002     Document Type: Conference Paper
Times cited : (41)

References (18)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi, and B. Blanchet Analyzing security protocols with secrecy types and logic programs Journal of the ACM 52 1 2005 102 146
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 33645689192 scopus 로고    scopus 로고
    • Certified email with a light on-line trusted third party: Design and implementation
    • WWW'02, May 2002, Honolulu, HA, USA ACM Press
    • M. Abadi, N. Glew, B. Horne, and B. Pinkas Certified email with a light on-line trusted third party: Design and implementation 11th International World Wide Web Conference WWW'02, May 2002, Honolulu, HA, USA 2002 ACM Press
    • (2002) 11th International World Wide Web Conference
    • Abadi, M.1    Glew, N.2    Horne, B.3    Pinkas, B.4
  • 3
    • 35248826039 scopus 로고    scopus 로고
    • Verifying second-level security protocols
    • D. Basin B. Wolff (Eds.), Theorem Proving in Higher Order Logics, TPHOLs'03, September 2003, Roma, Italy Springer Verlag
    • G. Bella, C. Longo, and L.C. Paulson Verifying second-level security protocols D. Basin B. Wolff Theorem Proving in Higher Order Logics TPHOLs'03, September 2003, Roma, Italy Lecture Notes in Computer Science vol. 2758 2003 Springer Verlag 352 366
    • (2003) Lecture Notes in Computer Science , vol.2758 , pp. 352-366
    • Bella, G.1    Longo, C.2    Paulson, L.C.3
  • 4
    • 0038011251 scopus 로고    scopus 로고
    • The verification of an industrial payment protocol: The SET purchase phase
    • V. Atluri CCS'02, November 2002, Washington, DC ACM Press
    • G. Bella, F. Massacci, and L.C. Paulson The verification of an industrial payment protocol: The SET purchase phase V. Atluri 9th ACM Conference on Computer and Communications Security CCS'02, November 2002, Washington, DC 2002 ACM Press 12 20
    • (2002) 9th ACM Conference on Computer and Communications Security , pp. 12-20
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 6
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • J.-J. Quisquater et al. (Eds.), Computer Security - ESORICS 98, September 1998, Louvain-la-Neuve, Belgium Springer Verlag
    • G. Bella, and L.C. Paulson Kerberos version IV: inductive analysis of the secrecy goals J.-J. Quisquater Computer Security - ESORICS 98 September 1998, Louvain-la-Neuve, Belgium Lecture Notes in Computer Science vol. 1485 1998 Springer Verlag 361 375
    • (1998) Lecture Notes in Computer Science , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 7
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada IEEE Computer Society
    • B. Blanchet An efficient cryptographic protocol verifier based on Prolog rules 14th IEEE Computer Security Foundations Workshop CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada 2001 IEEE Computer Society 82 96
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 8
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • M. Hermenegildo G. Puebla (Eds.), 9th International Static Analysis Symposium, SAS'02, September 2002, Madrid, Spain Springer Verlag
    • B. Blanchet From secrecy to authenticity in security protocols M. Hermenegildo G. Puebla 9th International Static Analysis Symposium SAS'02, September 2002, Madrid, Spain Lecture Notes in Computer Science vol. 2477 2002 Springer Verlag 342 359
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 9
    • 0348216654 scopus 로고    scopus 로고
    • A calculus for secure mobility
    • V. Saraswat (Ed.), Eighth Asian Computing Science Conference, ASIAN'03, December 2003, Mumbai, India Springer Verlag
    • B. Blanchet, and B. Aziz A calculus for secure mobility V. Saraswat Eighth Asian Computing Science Conference ASIAN'03, December 2003, Mumbai, India Lecture Notes in Computer Science vol. 2896 2003 Springer Verlag 188 204
    • (2003) Lecture Notes in Computer Science , vol.2896 , pp. 188-204
    • Blanchet, B.1    Aziz, B.2
  • 10
    • 0034835462 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada IEEE Computer Society
    • A. Gordon, and A. Jeffrey Authenticity by typing for security protocols 14th IEEE Computer Security Foundations Workshop CSFW-14, June 2001, Cape Breton, Nova Scotia, Canada 2001 IEEE Computer Society 145 159
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 145-159
    • Gordon, A.1    Jeffrey, A.2
  • 11
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada IEEE Computer Society
    • A. Gordon, and A. Jeffrey Types and effects for asymmetric cryptographic protocols 15th IEEE Computer Security Foundations Workshop CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada 2002 IEEE Computer Society 77 91
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 77-91
    • Gordon, A.1    Jeffrey, A.2
  • 13
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada IEEE Computer Society
    • S. Kremer, and J.-F. Raskin Game analysis of abuse-free contract signing 15th IEEE Computer Security Foundations Workshop CSFW-15, June 2002, Cape Breton, Nova Scotia, Canada 2002 IEEE Computer Society 206 222
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 206-222
    • Kremer, S.1    Raskin, J.-F.2
  • 16
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • CSFW-11, June 1998, Rockport, MA IEEE Computer Society
    • S. Schneider Formal analysis of a non-repudiation protocol 11th IEEE Computer Security Foundations Workshop CSFW-11, June 1998, Rockport, MA 1998 IEEE Computer Society 54 65
    • (1998) 11th IEEE Computer Security Foundations Workshop , pp. 54-65
    • Schneider, S.1
  • 17
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov, and J.C. Mitchell Finite-state analysis of two contract signing protocols Theoretical Computer Science 283 2 2002 419 450
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.