메뉴 건너뛰기




Volumn 3580, Issue , 2005, Pages 16-29

Probabilistic polynomial-time semantics for a protocol security logic

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; POLYNOMIALS; SECURITY OF DATA; SEMANTICS;

EID: 26444565771     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11523468_2     Document Type: Conference Paper
Times cited : (67)

References (18)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 6
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Lecture Notes in Computer Science. Springer-Verlag
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proceedings of 14th European Symposium on Programming (ESOP'05), Lecture Notes in Computer Science, pages 157-171. Springer-Verlag, 2005.
    • (2005) Proceedings of 14th European Symposium on Programming (ESOP'05) , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 10
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11:677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 14
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Lecture Notes in Computer Science. Springer-Verlag
    • R. Janvier, L. Mazare, and Y. Lakhnech. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proceedings of 14th European Symposium on Programming (ESOP'05), Lecture Notes in Computer Science, pages 172-185. Springer-Verlag, 2005.
    • (2005) Proceedings of 14th European Symposium on Programming (ESOP'05) , pp. 172-185
    • Janvier, R.1    Mazare, L.2    Lakhnech, Y.3
  • 15
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Theory of Cryptography Conference - Proceedings of TCC 2004, Springer-Verlag
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Theory of Cryptography Conference - Proceedings of TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 16
  • 17
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange (version 4)
    • IBM Research
    • V. Shoup. On formal models for secure key exchange (version 4). Technical Report RZ 3120, IBM Research, 1999.
    • (1999) Technical Report , vol.RZ 3120
    • Shoup, V.1
  • 18
    • 84942255620 scopus 로고    scopus 로고
    • A computational analysis of the Needham-Schroeder(-Lowe) protocol
    • ACM Press
    • B. Warinschi. A computational analysis of the Needham-Schroeder(-Lowe) protocol. In Proceedings of 16th Computer Science Foundation Workshop, pages 248-262. ACM Press, 2003.
    • (2003) Proceedings of 16th Computer Science Foundation Workshop , pp. 248-262
    • Warinschi, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.