메뉴 건너뛰기




Volumn , Issue , 2005, Pages 94-110

Compositional analysis of contract signing protocols

Author keywords

[No Author keywords available]

Indexed keywords

CONTRACT SIGNING PROTOCOLS;

EID: 28144440505     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2005.12     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 1
    • 0009360201 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • IBM Research
    • N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. Technical Report RZ 2976, IBM Research, 1997.
    • (1997) Technical Report , vol.RZ 2976
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 5
    • 35248877959 scopus 로고    scopus 로고
    • Contract signing, optimism, and advantage
    • 14th International Conference on Concurrency Theory (CONCUR '03). Springer-Verlag
    • R. Chadha, J. C. Mitchell, A. Scedrov, and V. Shmatikov. Contract signing, optimism, and advantage. In 14th International Conference on Concurrency Theory (CONCUR '03), volume 2761 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2761
    • Chadha, R.1    Mitchell, J.C.2    Scedrov, A.3    Shmatikov, V.4
  • 10
    • 24144437949 scopus 로고    scopus 로고
    • Secure protocol composition
    • Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics
    • A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition. In Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, volume 83 of Electronic Notes in Theoretical Computer Science, 2004.
    • (2004) Electronic Notes in Theoretical Computer Science , vol.83
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 12
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11:677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 13
    • 4243796648 scopus 로고
    • Relations among public key signature schemes
    • Computer Science Deptartment, Technion, Israel
    • S. Even and Y. Yacobi. Relations among public key signature schemes. Technical Report 175, Computer Science Deptartment, Technion, Israel, 1980.
    • (1980) Technical Report , vol.175
    • Even, S.1    Yacobi, Y.2
  • 15
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of non-repudiation protocols
    • S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of non-repudiation protocols. Computer Communications, 25(17):1606-1621, 2002.
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 21
    • 0003960505 scopus 로고    scopus 로고
    • On the impossibility of fair exchange without a trusted third party
    • Department of Computer Science, Darmstadt University of Technology, Darmstadt, Germany
    • H. Pagnia and F. C. Gärtner. On the impossibility of fair exchange without a trusted third party. Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology, Darmstadt, Germany, 1999.
    • (1999) Technical Report , vol.TUD-BS-1999-02
    • Pagnia, H.1    Gärtner, F.C.2
  • 22
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J. C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 24
    • 84961312272 scopus 로고    scopus 로고
    • Evolution of fair non-repudiation with TTP
    • Proceedings of the 4th Australasian Conference on Information Security and Privacy. Springer-Verlag
    • J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In Proceedings of the 4th Australasian Conference on Information Security and Privacy, volume 1587 of Lecture Notes in Computer Science, pages 258-269. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1587 , pp. 258-269
    • Zhou, J.1    Deng, R.2    Bao, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.