메뉴 건너뛰기




Volumn , Issue , 2003, Pages 11-23

Secure protocol composition

Author keywords

Invariants; Logic; Protocol Composition; Security Protocols

Indexed keywords

CONSTRAINT THEORY; DATA REDUCTION; FORMAL LOGIC; NETWORK PROTOCOLS; OPTIMIZATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 2642548302     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1035429.1035431     Document Type: Conference Paper
Times cited : (34)

References (38)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • Expanded version available as January
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
    • (1998) SRC Research Report , vol.149
  • 14
    • 0003272021 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • D. Harkins and D. Carrel. The Internet Key Exchange (IKE), 1998. RFC 2409.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 15
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • January
    • N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 16
    • 0038629629 scopus 로고
    • Entity authentication mechanisms - Part 3: Entity authentication using asymmetric techniques
    • ISO/IEC
    • IEEE. Entity authentication mechanisms - part 3: Entity authentication using asymmetric techniques. Technical report ISO/IEC IS 9798-3, ISO/IEC, 1993.
    • (1993) Technical Report , vol.ISO-IEC IS 9798-3
  • 21
    • 0036083020 scopus 로고    scopus 로고
    • On the composition of secure systems
    • Oakland, CA, USA, May 12-15. IEEE Computer Society
    • H. Mantel. On the Composition of Secure Systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 88-101, Oakland, CA, USA, May 12-15 2002. IEEE Computer Society.
    • (2002) Proceedings of the IEEE Symposium on Security and Privacy , pp. 88-101
    • Mantel, H.1
  • 22
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • Oakland, CA, USA, May. IEEE Computer Society
    • D. McCullough. Noninterference and the composability of security properties. In Proceedings of the IEEE Symposium on Security and Privacy, pages 177-186, Oakland, CA, USA, May 1988. IEEE Computer Society.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 25
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 27
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 30
    • 0141546693 scopus 로고
    • Action structures
    • Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
    • R. Milner. Action structures. LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
    • (1992) LFCS Report , vol.ECS-LFCS-92-249
    • Milner, R.1
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 34
    • 85013569711 scopus 로고    scopus 로고
    • Categorical logic of names and abstraction in action calculi
    • D. Pavlovic. Categorical logic of names and abstraction in action calculi. Math. Structures in Comp. Sci., 7(6):619-637, 1997.
    • (1997) Math. Structures in Comp. Sci. , vol.7 , Issue.6 , pp. 619-637
    • Pavlovic, D.1
  • 36
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes and Cryptography, 7(1-2):27-59, 1996.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.