메뉴 건너뛰기




Volumn 3653, Issue , 2005, Pages 217-232

Selecting theories and recursive protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; CRYPTOGRAPHY; MATHEMATICAL MODELS; MATHEMATICAL TECHNIQUES; SECURITY OF DATA; TRANSDUCERS;

EID: 27344455431     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11539452_19     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • CONCUR, Springer
    • Roberto M. Amadio and Witold Charatonik, On name generation and set-based analysis in the Dolev-Yao model, CONCUR, Lecture Notes in Computer Science, vol. 2421, Springer, 2002, pp. 499-514.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 499-514
    • Amadio, R.M.1    Charatonik, W.2
  • 4
    • 14044264137 scopus 로고    scopus 로고
    • The authentication protocol
    • Defence Research Agency, Malvern, UK
    • J.A. Bull and D.J. Otway, The authentication protocol, Technical Report DRA/CIS3/PROJ/ CORBA/SC/1/CSM/436-04/-03, Defence Research Agency, Malvern, UK, 1997.
    • (1997) Technical Report , vol.DRA-CIS3-PROJ- CORBA-SC-1-CSM-436-04-03
    • Bull, J.A.1    Otway, D.J.2
  • 5
    • 18544387122 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, FSTTCS, 2003.
    • (2003) FSTTCS
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 6
    • 27344447961 scopus 로고    scopus 로고
    • An NP decision procedure for protocol insecurity with XOR
    • _, An NP decision procedure for protocol insecurity with XOR, LICS, 2003.
    • (2003) LICS
  • 8
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and indecurity decision in presence of exclusive or
    • H. Comon-Lundh and V. Shmatikov, Intruder deductions, constraint solving and indecurity decision in presence of exclusive or, LICS, 2003.
    • (2003) LICS
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 11
    • 0004170287 scopus 로고
    • On the security of multi-party ping-pong protocols
    • Israel Institute of Technology
    • S. Even and O. Goldreich, On the security of multi-party ping-pong protocols. Technical Report 285, Israel Institute of Technology, 1983.
    • (1983) Technical Report , vol.285
    • Even, S.1    Goldreich, O.2
  • 12
    • 27344454831 scopus 로고    scopus 로고
    • Automata-based analysis of recursive cryptographic protocols
    • CAU Kiel
    • Ralf Küsters and Thomas Wilke, Automata-based analysis of recursive cryptographic protocols, Technical Report IFI 0311, CAU Kiel, 2003.
    • (2003) Technical Report , vol.IFI 0311
    • Küsters, R.1    Wilke, T.2
  • 13
    • 35048832860 scopus 로고    scopus 로고
    • Automata-based analysis of recursive cryptographic protocols
    • STACS, Springer
    • _, Automata-based analysis of recursive cryptographic protocols, STACS, Lecture Notes in Computer Science, vol. 2996, Springer, 2004, pp. 382-393.
    • (2004) Lecture Notes in Computer Science , vol.2996 , pp. 382-393
  • 14
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • Catherine Meadows, Formal methods for cryptographic protocol analysis: Emerging issues and trends, IEEE Journal on Selected Areas in Communication 21 (2003), no. 1, 44-54.
    • (2003) IEEE Journal on Selected Areas in Communication , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 16
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with a finite number of sessions, composed keys is NP-complete
    • Michael Rusinowitch and Mathieu Turuani, Protocol insecurity with a finite number of sessions, composed keys is NP-complete, Theor. Comput. Sci. 1-3 (2003), no. 299, 451-475.
    • (2003) Theor. Comput. Sci. , vol.1-3 , Issue.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 17
    • 27344453175 scopus 로고    scopus 로고
    • Regular protocols and attacks with regular knowledge
    • LNCS, Springer, to appear
    • Tomasz Truderung, Regular protocols and attacks with regular knowledge. Proceedings of CADE 2005, LNCS, Springer, 2005, to appear.
    • (2005) Proceedings of CADE 2005
    • Truderung, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.