메뉴 건너뛰기




Volumn 3653, Issue , 2005, Pages 186-201

Secrecy despite compromise: Types, cryptography, and the Pi-calculus

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 27244444891     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11539452_17     Document Type: Conference Paper
Times cited : (26)

References (24)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept.
    • M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, Sept. 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • IOS Press, Amsterdam
    • M. Abadi. Security protocols and their properties. In Foundations of Secure Computation, pages 39-60. IOS Press, Amsterdam, 2000.
    • (2000) Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 3
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Comput. Sci., 298(3):387-415, 2003.
    • (2003) Theoretical Comput. Sci. , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • 9th International Static Analysis Symposium (SAS'02). Springer
    • B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 242-259. Springer, 2002.
    • (2002) LNCS , vol.2477 , pp. 242-259
    • Blanchet, B.1
  • 7
    • 28144441375 scopus 로고    scopus 로고
    • On declassification and the non-disclosure policy
    • IEEE Computer Society Press. To appear
    • G. Boudol and A. Matos. On declassification and the non-disclosure policy. In 18th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2005. To appear.
    • (2005) 18th IEEE Computer Security Foundations Workshop
    • Boudol, G.1    Matos, A.2
  • 11
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols
    • Software Security - Theories and Systems. Springer
    • A. D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security - Theories and Systems, volume 2609 of LNCS, pages 270-282. Springer, 2002.
    • (2002) LNCS , vol.2609 , pp. 270-282
    • Gordon, A.D.1    Jeffrey, A.2
  • 12
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.2
  • 13
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
    • (2003) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 14
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300:379-409, 2003.
    • (2003) Theoretical Computer Science , vol.300 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 15
    • 27244431608 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • Microsoft Research
    • A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. Technical Report MSR-TR-2005-76, Microsoft Research, 2005.
    • (2005) Technical Report , vol.MSR-TR-2005-76
    • Gordon, A.D.1    Jeffrey, A.2
  • 16
    • 84979035734 scopus 로고    scopus 로고
    • A typed process calculus for fine-grained resource access control in distributed computation
    • 4th International Symposium on Theoretical Aspects of Computer Software (TACS 2001). Springer
    • D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In 4th International Symposium on Theoretical Aspects of Computer Software (TACS 2001), volume 2215 of LNCS, pages 64-81. Springer, 2001.
    • (2001) LNCS , vol.2215 , pp. 64-81
    • Hoshina, D.1    Sumii, E.2    Yonezawa, A.3
  • 19
    • 84957891289 scopus 로고
    • Polarized name passing
    • Foundations of Software Technology and Theoretical Computer Science. Springer
    • M. Odersky. Polarized name passing. In Foundations of Software Technology and Theoretical Computer Science, volume 1026 of LNCS, pages 324-335. Springer, 1995.
    • (1995) LNCS , vol.1026 , pp. 324-335
    • Odersky, M.1
  • 23
    • 24344486699 scopus 로고    scopus 로고
    • The Flow Caml system: Documentation and user's manual
    • INRIA
    • V. Simonet. The Flow Caml system: documentation and user's manual. Technical Report 0282, INRIA, 2003.
    • (2003) Technical Report , vol.282
    • Simonet, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.