메뉴 건너뛰기




Volumn 3653, Issue , 2005, Pages 202-216

Timed spi-calculus with types for secrecy and authenticity

Author keywords

[No Author keywords available]

Indexed keywords

FAILURE ANALYSIS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; STANDARDS; TIME SHARING SYSTEMS;

EID: 27244455595     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11539452_18     Document Type: Conference Paper
Times cited : (14)

References (22)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Foundations of Software Science and Computation Structures. Springer
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Foundations of Software Science and Computation Structures, volume 2030 of LNCS. Springer, 2001.
    • (2001) LNCS , vol.2030
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 7
    • 35048864876 scopus 로고    scopus 로고
    • Automatic verification of time sensitive cryptographic protocols
    • K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems. Springer
    • G. Delzanno and P. Ganty. Automatic verification of time sensitive cryptographic protocols. In K. Jensen and A. Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems, volume 2988 of LNCS, pages 342-356. Springer, 2004.
    • (2004) LNCS , vol.2988 , pp. 342-356
    • Delzanno, G.1    Ganty, P.2
  • 8
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D.E. Denning and G.M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 9
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in CSP using PVS
    • F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, ESORICS. Springer
    • N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, ESORICS, volume 1895 of LNCS, pages 222-237. Springer, 2000.
    • (2000) LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 10
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols
    • Proc. Int. Software Security Symp. Springer-Verlag
    • A. D. Gordon and A.S.A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Proc. Int. Software Security Symp., volume 2609 of Lecture Notes in Computer Science, pages 263-282. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2609 , pp. 263-282
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 11
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A.D. Gordon and A.S.A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 12
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A.D. Gordon and A.S.A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2003.
    • (2003) J. Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 13
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography and the pi-calculus
    • LNCS. Springer
    • A.D. Gordon and A.S.A. Jeffrey. Secrecy despite compromise: Types, cryptography and the pi-calculus. In CONCUR 2005: Concurrency Theory, LNCS. Springer, 2005.
    • (2005) CONCUR 2005: Concurrency Theory
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 14
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for realtime cryptographic protocol analysis
    • P. Degano, editor, 12th European Symposium on Programming. Springer
    • R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for realtime cryptographic protocol analysis. In P. Degano, editor, 12th European Symposium on Programming, volume 2618 of LNCS, pages 114-128. Springer, 2003.
    • (2003) LNCS , vol.2618 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 15
    • 18944391675 scopus 로고    scopus 로고
    • Key compromise, strand spaces, and the authentication tests
    • Joshua D. Guttman. Key compromise, strand spaces, and the authentication tests. Electr. Notes Theor. Comput. Sci., 45, 2001.
    • (2001) Electr. Notes Theor. Comput. Sci. , vol.45
    • Guttman, J.D.1
  • 16
    • 84902449094 scopus 로고    scopus 로고
    • Pattern-matching spi-calculus
    • 2nd IFIP Workshop on Formal Aspects in Security and Trust. Kluwer Academic Press
    • C. Haack and A.S.A. Jeffrey. Pattern-matching spi-calculus. In 2nd IFIP Workshop on Formal Aspects in Security and Trust, volume 173 of IFIP. Kluwer Academic Press, 2004.
    • (2004) IFIP , vol.173
    • Haack, C.1    Jeffrey, A.S.A.2
  • 18
    • 4944243609 scopus 로고
    • A process algebra for timed systems
    • M. Hennessy and T. Regan. A process algebra for timed systems. Information and Computation, 117(2):221-239, 1995.
    • (1995) Information and Computation , vol.117 , Issue.2 , pp. 221-239
    • Hennessy, M.1    Regan, T.2
  • 19
    • 27244438198 scopus 로고    scopus 로고
    • A symbolic decision procedure for cryptographic protocols with time stamps
    • CONCUR 2004: Concurrency Theory. Springer
    • Y. Lakhnech L. Bozga, C. Ene. A symbolic decision procedure for cryptographic protocols with time stamps. In CONCUR 2004: Concurrency Theory, volume 3170 of LNCS, pages 177-192. Springer, 2004.
    • (2004) LNCS , vol.3170 , pp. 177-192
    • Lakhnech, Y.1    Bozga, L.2    Ene, C.3
  • 20
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 21
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.