메뉴 건너뛰기




Volumn 3466, Issue , 2005, Pages 66-89

Operational semantics of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY SYSTEMS;

EID: 24944514681     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11495628_4     Document Type: Conference Paper
Times cited : (37)

References (17)
  • 1
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21 (1978) 993-999
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 3
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer Verlag
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proceedings of TACAS. Volume 1055., Springer Verlag (1996) 147-166
    • (1996) Proceedings of TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 6
    • 0036768550 scopus 로고    scopus 로고
    • A hierarchy of communication models for message sequence charts
    • Engels, A.G., Mauw, S., Reniers, M.: A hierarchy of communication models for Message Sequence Charts. Science of Computer Programming 44 (2002) 253-292
    • (2002) Science of Computer Programming , vol.44 , pp. 253-292
    • Engels, A.G.1    Mauw, S.2    Reniers, M.3
  • 7
    • 0003931061 scopus 로고
    • A structural approach to operational semantics
    • Computer Science Department, Aarhus University
    • Plotkin, G.: A structural approach to operational semantics. Technical Report DIAMI FN-19, Computer Science Department, Aarhus University (1981)
    • (1981) Technical Report , vol.DIAMI FN-19
    • Plotkin, G.1
  • 10
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE
    • Lowe, G.: Casper: A compiler for the analysis of security protocols. In: Proc. 10th Computer Security Foundations Workshop, IEEE (1997) 18-30
    • (1997) Proc. 10th Computer Security Foundations Workshop , pp. 18-30
    • Lowe, G.1
  • 13
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. Inf. Comput. 148 (1999) 1-70
    • (1999) Inf. Comput. , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 14
    • 44049113210 scopus 로고
    • A calculus of mobile processes, i
    • Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, i. Inf. Comput. 100 (1992) 1-40
    • (1992) Inf. Comput. , vol.100 , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 16
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • Martinelli, F.: Analysis of security protocols as open systems. Theor. Comput. Sci. 290 (2003) 1057-1106
    • (2003) Theor. Comput. Sci. , vol.290 , pp. 1057-1106
    • Martinelli, F.1
  • 17
    • 24944551065 scopus 로고    scopus 로고
    • Checking secrecy by means of partial order reduction
    • Amyot, D., Williams, A., eds.: SAM 2004: Security Analysis and Modelling, Ottawa, Canada, Springer-Verlag, Berlin
    • Cremers, C., Mauw, S.: Checking secrecy by means of partial order reduction. In Amyot, D., Williams, A., eds.: SAM 2004: Security Analysis and Modelling. Volume LNCS 3319 of Proceedings of the fourth SDL and MSC Workshop., Ottawa, Canada, Springer-Verlag, Berlin (2004) 177-194
    • (2004) Proceedings of the Fourth SDL and MSC Workshop , vol.LNCS 3319 , pp. 177-194
    • Cremers, C.1    Mauw, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.