메뉴 건너뛰기




Volumn 3170, Issue , 2004, Pages 177-192

A symbolic decision procedure for cryptographic protocols with time stamps

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 27244438198     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-28644-8_12     Document Type: Article
Times cited : (8)

References (17)
  • 1
    • 84863900858 scopus 로고    scopus 로고
    • Mechanizing BAN Kerberos by the inductive method
    • A. J. Hu and M. Y. Vardi, editors, Vancouver, B.C., Canada, June Springer-Verlag LNCS 1427
    • G. Bella and L. G. Paulson. Mechanizing BAN Kerberos by the inductive method. In A. J. Hu and M. Y. Vardi, editors, Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), pages 416-427, Vancouver, B.C., Canada, June 1998. Springer-Verlag LNCS 1427.
    • (1998) Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98) , pp. 416-427
    • Bella, G.1    Paulson, L.G.2
  • 2
    • 31744449038 scopus 로고    scopus 로고
    • On the existence of an effective and complete proof system for bounded security protocols
    • LNCS
    • L. Bozga, C. Ene, and Y. Lakhnech. On the existence of an effective and complete proof system for bounded security protocols. In FOSSACS, vol. 2987. LNCS, 2004.
    • (2004) FOSSACS , vol.2987
    • Bozga, L.1    Ene, C.2    Lakhnech, Y.3
  • 8
    • 84944070422 scopus 로고    scopus 로고
    • Analyzing time dependent security properties in CSP using PVS
    • Neil Evans and Steve Schneider. Analyzing time dependent security properties in CSP using PVS. In ESORICS, pages 222-237, 2000.
    • (2000) ESORICS , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 9
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • Washington - Brussels - Tokyo, June IEEE
    • M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 160-173, Washington - Brussels - Tokyo, June 2001. IEEE.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW '01) , pp. 160-173
    • Fiore, M.1    Abadi, M.2
  • 10
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • Li Gong. A security risk of depending on synchronized clocks. Operating Systems Review, 26(1):49-53, 1992.
    • (1992) Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 11
    • 1442311382 scopus 로고    scopus 로고
    • A simple framework for real-time cryptographic protocol analysis with compositional proof rules
    • Roberto Gorrieri and Fabio Martinelli. A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Science of Computer Programming, 50(1-3):23-49, 2004.
    • (2004) Science of Computer Programming , vol.50 , Issue.1-3 , pp. 23-49
    • Gorrieri, R.1    Martinelli, F.2
  • 12
    • 0002692684 scopus 로고
    • Solving equations in abstract algebras: A rule-based survey of unification
    • Jean-Louis Lassez and Gordon Plotkin, editors, MIT-Press
    • J.-P. Jouannaud and C. Kirchner. Solving equations in abstract algebras: A rule-based survey of unification. In Jean-Louis Lassez and Gordon Plotkin, editors, Computational Logic: Essays in Honor of Alan Robinson. MIT-Press, 1991.
    • (1991) Computational Logic: Essays in Honor of Alan Robinson
    • Jouannaud, J.-P.1    Kirchner, C.2
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
    • LNCS
    • G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems , vol.1055 , pp. 147-166
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.