메뉴 건너뛰기




Volumn 2126 LNCS, Issue , 2001, Pages 433-436

Abstracting cryptographic protocols by prolog rules

Author keywords

[No Author keywords available]

Indexed keywords

STATIC ANALYSIS;

EID: 24644497304     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47764-0_27     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 0003515822 scopus 로고    scopus 로고
    • Explicit communication revisited: Two new attacks on authentication protocols
    • March
    • Martín Abadi. Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Transactions on Software Engineering, 23(3): 185-186, March 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.3 , pp. 185-186
    • Abadi, M.1
  • 4
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • January
    • Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1): 6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, Canada, June
    • Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, Canada, June 2001.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14)
    • Blanchet, B.1
  • 16
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Larry C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2): 85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 17
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A.W. Roscoe and P.J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(2, 3): 147-190, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.