메뉴 건너뛰기




Volumn 2803, Issue , 2003, Pages 128-141

Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 26944465513     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45220-1_13     Document Type: Article
Times cited : (13)

References (19)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On Name Generation and Set-Based Analysis in the Dolev-Yao Model
    • CONCUR 2002, Springer-Verlag
    • R.M. Amadio and W. Charatonik. On Name Generation and Set-Based Analysis in the Dolev-Yao Model. In CONCUR 2002, LNCS 2421, pages 499-514. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2421 , pp. 499-514
    • Amadio, R.M.1    Charatonik, W.2
  • 6
    • 0041498629 scopus 로고    scopus 로고
    • Automated unbounded verification of security protocols
    • Springer
    • Y. Chevalier and L. Vigneron. Automated unbounded verification of security protocols. In CAV 2002, Springer, 2002.
    • (2002) CAV 2002
    • Chevalier, Y.1    Vigneron, L.2
  • 8
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), Valencia, Spain, June To appear
    • H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), Valencia, Spain, June 2003, volume 2706 of LNCS. To appear.
    • (2003) LNCS , vol.2706
    • Comon-Lundh, H.1    Cortier, V.2
  • 10
    • 85008027756 scopus 로고    scopus 로고
    • Complexity and expressive power of logic programming
    • IEEE Computer Society
    • E. Dantsin, T. Eiter, G. Gottlob, and A. Voronkov. Complexity and expressive power of logic programming. In CCC'97, pages 82-101. IEEE Computer Society, 1997.
    • (1997) CCC'97 , pp. 82-101
    • Dantsin, E.1    Eiter, T.2    Gottlob, G.3    Voronkov, A.4
  • 14
    • 0020889144 scopus 로고
    • On the Security of Multi-Party Ping-Pong Protocols
    • S. Even and O. Goldreich. On the Security of Multi-Party Ping-Pong Protocols. In FOCS'83, pages 34-39, 1983.
    • (1983) FOCS'83 , pp. 34-39
    • Even, S.1    Goldreich, O.2
  • 16
    • 84874721799 scopus 로고    scopus 로고
    • On the decidability of cryptographic protocols with open-ended data structures
    • CONCUR 2002, Springer-Verlag
    • R. Küsters. On the decidability of cryptographic protocols with open-ended data structures. In CONCUR 2002, LNCS 2421, pages 515-530. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2421 , pp. 515-530
    • Küsters, R.1
  • 17
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press
    • C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
    • (2000) DISCEX 2000 , pp. 237-250
    • Meadows, C.1
  • 18
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
    • (2001) CCS 2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 19
    • 0034822801 scopus 로고    scopus 로고
    • Protocol Insecurity with Finite Number of Sessions is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. In CSFW-14, pages 174-190, 2001.
    • (2001) CSFW-14 , pp. 174-190
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.