메뉴 건너뛰기




Volumn 12, Issue 6, 2004, Pages 865-891

The faithfulness of abstract protocol analysis: Message authentication

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTIC STABILITY; CRYPTOGRAPHY; FUNCTIONS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 27844571925     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2004-12603     Document Type: Article
Times cited : (7)

References (35)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2) (2002), 103-127.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84937407919 scopus 로고    scopus 로고
    • Deriving cryptographically sound implementations using composition and formally verified bisimulation
    • Formal Methods Europe '02 (PME), Springer
    • M. Backes, C. Jacobi and B. Pfitzmann, Deriving cryptographically sound implementations using composition and formally verified bisimulation, in: Formal Methods Europe '02 (PME), Volume 2391 of LNCS, Springer, 2002, pp. 310-329.
    • (2002) LNCS , vol.2391 , pp. 310-329
    • Backes, M.1    Jacobi, C.2    Pfitzmann, B.3
  • 4
    • 84947928286 scopus 로고    scopus 로고
    • Practice-oriented provable security
    • First International Workshop on Information Security (ISW 97), E. Okamoto, G. Davida and M. Mambo, eds., Springer
    • M. Bellare, Practice-oriented provable security, in: First International Workshop on Information Security (ISW 97), E. Okamoto, G. Davida and M. Mambo, eds. Volume 1396 of LNCS, Springer, 1998.
    • (1998) LNCS , vol.1396
    • Bellare, M.1
  • 5
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • Advances in Cryplology - Crypto 94, Yvo Desmedt, ed., Springer
    • M. Bellare, J. Killian and P. Rogaway, The security of cipher block chaining, in: Advances in Cryplology - Crypto 94, Yvo Desmedt, ed., Volume 839 of LNCS, Springer, 1994.
    • (1994) LNCS , vol.839
    • Bellare, M.1    Killian, J.2    Rogaway, P.3
  • 6
    • 22344443539 scopus 로고
    • Entity authentication and key distribution
    • Springer
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryplology - Crypto '93 Proceedings, Springer, 1993. Full version available at http://www-cse.ucsd.edu/users/mihir/papers/eakd.ps.
    • (1993) Advances in Cryplology - Crypto '93 Proceedings
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 0003185332 scopus 로고
    • shortened form, February
    • and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.1 , pp. 18-36
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Report 2000/067, Internation Association for Crryptographic Research, October 2001. Extended Abstract appeared
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols. Report 2000/067, Internation Association for Crryptographic Research, October 2001. Extended Abstract appeared in: Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS), 2001.
    • (2001) Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS)
    • Canetti, R.1
  • 11
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • LNCS, Springer
    • R. Canetti and H. Krawczyk, Universally composable notions of key exchange and secure channels, in: Eurocrypt 2002, LNCS, Springer, 2002, pp. 337-351.
    • (2002) Eurocrypt 2002 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 12
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • U. Carlsen, Optimal privacy and authentication on a portable communications system, Operating Systems Review 28(3) (1994), 16-23.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carlsen, U.1
  • 19
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J.D. Guttman and F. Javier Thayer Fábrega, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Fábrega, F.J.T.2
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceeedings of TACAS, Springer
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceeedings of TACAS, Volume 1055 of Lecture Notes in Computer Science, Springer, 1996, pp. 147-166.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 22
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press
    • G. Lowe, A hierarchy of authentication specifications, in: 10th Computer Security Foundations Workshop Proceedings, IEEE Computer Society Press, 1997, pp. 31-43.
    • (1997) 10th Computer Security Foundations Workshop Proceedings , pp. 31-43
    • Lowe, G.1
  • 23
    • 85063350588 scopus 로고
    • A model of computation for the NRL protocol analyzer
    • IEEE, IEEE Computer Society Press
    • C. Meadows, A model of computation for the NRL protocol analyzer, in: Proceedings of the Computer Security Foundations Workshop VII, IEEE, IEEE Computer Society Press, 1994, pp. 84-89.
    • (1994) Proceedings of the Computer Security Foundations Workshop VII , pp. 84-89
    • Meadows, C.1
  • 25
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees, Efficient and timely mutual authentication, Operating Systems Review 21(1) (1987), 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 26
    • 0030705795 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • IEEE Computer Society Press
    • L.C. Paulson, Proving properties of security protocols by induction, in: 10th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1997, pp. 70-83.
    • (1997) 10th IEEE Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.C.1
  • 27
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society Press
    • A. Perrig and D.X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000.
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Song, D.X.2
  • 30
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE CS Press, Preprint
    • B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proceedings, 2001 IEEE Symposium on Security and Privacy, IEEE CS Press, 2001. Preprint at http://iacr.org/2000/066.ps.gz.
    • (2001) Proceedings, 2001 IEEE Symposium on Security and Privacy
    • Pfitzmann, B.1    Waidner, M.2
  • 32
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • (#93166), IBM Research, April. A revised version 4, dated November 15, 1999
    • V. Shoup, On formal models for secure key exchange, Research Report RZ 3120 (#93166), IBM Research, April 1999. A revised version 4, dated November 15, 1999, is available from http://www.shoup.net/papers/.
    • (1999) Research Report , vol.RZ 3120
    • Shoup, V.1
  • 34
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981), 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.