메뉴 건너뛰기




Volumn 81, Issue , 2002, Pages 5-24

Verifying authentication protocol implementations

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 24644523336     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35496-5_2     Document Type: Review
Times cited : (4)

References (34)
  • 4
    • 20144372297 scopus 로고    scopus 로고
    • Embedding csp in pvs: An application to authentication protocols
    • Dutertre, B. and Schneider, S. (1997). Embedding csp in pvs: an application to authentication protocols. In tpHOL.
    • (1997) TpHOL
    • Dutertre, B.1    Schneider, S.2
  • 5
    • 84891301416 scopus 로고    scopus 로고
    • An authentication protocol using one-way functions: A pvs analysis
    • Royal Holloway, University of London
    • Evans, N. and Schneider, S. A. (2001a). An authentication protocol using one-way functions: a pvs analysis. Technical report, Royal Holloway, University of London.
    • (2001) Technical Report
    • Evans, N.1    Schneider, S.A.2
  • 6
    • 84891288865 scopus 로고    scopus 로고
    • A practical introduction to using CSP and PVS to prove authentication properties of security protocols
    • Royal Holloway, University of London
    • Evans, N. and Schneider, S. A. (2001b). A practical introduction to using CSP and PVS to prove authentication properties of security protocols. Technical report, Royal Holloway, University of London.
    • (2001) Technical Report
    • Evans, N.1    Schneider, S.A.2
  • 10
    • 0002783180 scopus 로고
    • Using one-way functions for authentication
    • Gong, L. (1989). Using one-way functions for authentication. Computer Communication Review, 19(5).
    • (1989) Computer Communication Review , vol.19 , Issue.5
    • Gong, L.1
  • 16
  • 17
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • Lowe, G. (1995). An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56, 56.
    • (1995) Information Processing Letters , vol.56 , pp. 56
    • Lowe, G.1
  • 18
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • of LNCS. Springer
    • Lowe, G. (1996). Breaking and fixing the needham-schroeder public-key protocol using FDR,. In TACAS, volume 1055 of LNCS. Springer.
    • (1996) TACAS , vol.1055
    • Lowe, G.1
  • 21
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Meadows, C. (1992). Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1).
    • (1992) Journal of Computer Security , vol.1 , Issue.1
    • Meadows, C.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12).
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 24
    • 0003524744 scopus 로고
    • The PVS specification language
    • Computer Science Lab, SRI International
    • Owre, S., Shankar, N., and Rushby, J. (1993). The PVS specification language. Technical report, Computer Science Lab, SRI International.
    • (1993) Technical Report
    • Owre, S.1    Shankar, N.2    Rushby, J.3
  • 25
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security.
    • (1998) Journal of Computer Security
    • Paulson, L.1
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM.
    • (1978) Communications of the ACM
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • Ryan, P. and Schneider, S. (1998). An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters.
    • (1998) Information Processing Letters
    • Ryan, P.1    Schneider, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.