메뉴 건너뛰기




Volumn 3653, Issue , 2005, Pages 233-247

Constraint solving for contract-signing protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; GAME THEORY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 27244431635     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11539452_20     Document Type: Conference Paper
Times cited : (14)

References (15)
  • 1
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002.
    • (2002) Theoretical Computer Science , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.M.1    Lugiez, D.2    Vanackere, V.3
  • 3
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Security&Privacy 2002, pages 86-99, 1998.
    • (1998) Security&Privacy 2002 , pp. 86-99
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 4
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • LNCS 2808. Springer
    • D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In ESORICS 2003, LNCS 2808, pages 253-270. Springer, 2003.
    • (2003) ESORICS 2003 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 5
    • 0035751922 scopus 로고    scopus 로고
    • Inductive methods and contract-signing protocols
    • ACM Press
    • R. Chadha, M.I. Kanovich, and A.Scedrov. Inductive methods and contract-signing protocols. In CCS 2001, pages 176-185. ACM Press, 2001.
    • (2001) CCS 2001 , pp. 176-185
    • Chadha, R.1    Kanovich, M.I.2    Scedrov, A.3
  • 6
    • 0041967380 scopus 로고    scopus 로고
    • An NP decision procedure for protocol insecurity with XOR
    • IEEE, Computer Society Press
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In LICS 2003, pages 261-270. IEEE, Computer Society Press, 2003.
    • (2003) LICS 2003 , pp. 261-270
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 7
    • 84944686372 scopus 로고    scopus 로고
    • A tool for lazy verification of security protocols
    • IEEE CS Press
    • Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In ASE 2001, pages 373-376. IEEE CS Press, 2001.
    • (2001) ASE 2001 , pp. 373-376
    • Chevalier, Y.1    Vigneron, L.2
  • 8
    • 27244456479 scopus 로고    scopus 로고
    • The ASW protocol revisited: A unified view
    • P. H. Drielsma and S. Mödersheim. The ASW Protocol Revisited: A Unified View. In ARSPA, 2004.
    • (2004) ARSPA
    • Drielsma, P.H.1    Mödersheim, S.2
  • 9
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • LNCS 1666, Springer-Verlag
    • J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In CRYPTO'99, LNCS 1666, pages 449-466. Springer-Verlag, 1999.
    • (1999) CRYPTO'99 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.3
  • 10
    • 27244444696 scopus 로고    scopus 로고
    • A constraint-based algorithm for contract-signing protocols
    • IFI 0503, CAU Kiel, Germany
    • D. Kähler and R. Küsters. A Constraint-Based Algorithm for Contract-Signing Protocols. Technical report, IFI 0503, CAU Kiel, Germany, 2005. Available from http://www.informatik.uni-kiel.de/reports/2005/0503.html
    • (2005) Technical Report
    • Kähler, D.1    Küsters, R.2
  • 11
    • 24144437134 scopus 로고    scopus 로고
    • Deciding properties of contract-signing protocols
    • LNCS 3404, Springer
    • D. Kähler, R. Küsters, and Th. Wilke. Deciding Properties of Contract-Signing Protocols. In STACS 2005, LNCS 3404, pages 158-169. Springer, 2005.
    • (2005) STACS 2005 , pp. 158-169
    • Kähler, D.1    Küsters, R.2    Wilke, Th.3
  • 12
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • IEEE Computer Society
    • S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In CSFW 2002, pages 206-220. IEEE Computer Society, 2002.
    • (2002) CSFW 2002 , pp. 206-220
    • Kremer, S.1    Raskin, J.-F.2
  • 13
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
    • (2001) CCS 2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 14
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with a finite number of sessions, composed keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 299(1-3):451-475, 2003.
    • (2003) Theoretical Computer Science , vol.299 , Issue.1-3 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 15
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J.C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.