메뉴 건너뛰기




Volumn 3668, Issue , 2005, Pages 439-440

PS-LTL for constraint-based security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; INFORMATION ANALYSIS; KNOWLEDGE REPRESENTATION; LOGIC PROGRAMMING; PROBLEM SOLVING; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 27144466741     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11562931_46     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 3
    • 27144458660 scopus 로고    scopus 로고
    • A trace logic for local security properties
    • Mumbai, India, Dec. Elsevier Science in Electronic Notes in Theoretical Computer Science
    • R. Corin, A. Durante, S. Etalle, and P. H. Hartel. A trace logic for local security properties. In Int. Workshop on Software Verification and Validation (SVV), volume 118, pages 129-143, Mumbai, India, Dec 2003. Elsevier Science in Electronic Notes in Theoretical Computer Science.
    • (2003) Int. Workshop on Software Verification and Validation (SVV) , vol.118 , pp. 129-143
    • Corin, R.1    Durante, A.2    Etalle, S.3    Hartel, P.H.4
  • 4
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • M. V. Hermenegildo and G. Puebla, editors, Madrid, Spain, Sep. Springer-Verlag, Berlin
    • R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In M. V. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symp. (SAS), volume LNCS 2477, pages 326-341, Madrid, Spain, Sep 2002. Springer-Verlag, Berlin.
    • (2002) 9th Int. Static Analysis Symp. (SAS) , vol.LNCS 2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 7
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 9
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM SIGSAC, November
    • J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In 8th ACM Conference on Computer and Communication Security, pages 166-175. ACM SIGSAC, November 2001.
    • (2001) 8th ACM Conference on Computer and Communication Security , pp. 166-175
    • Millen, J.1    Shmatikov, V.2
  • 11
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.
    • (1996) Designs, Codes, and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.