메뉴 건너뛰기




Volumn , Issue , 2005, Pages 62-76

Deciding knowledge in security protocols under (many more) equational theories

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; THEOREM PROVING;

EID: 28144451656     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (20)
  • 1
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Proc. 31st Int. Coll. Automata, Languages, and Programming (ICALP 2004), Turku, Finland, July. Springer
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proc. 31st Int. Coll. Automata, Languages, and Programming (ICALP 2004), volume 3142 of LNCS, pages 46-58, Turku, Finland, July 2004. Springer.
    • (2004) LNCS , vol.3142 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2): 103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 28144460900 scopus 로고    scopus 로고
    • Private communication
    • M. Baudet. Private communication. 2005.
    • (2005)
    • Baudet, M.1
  • 7
    • 35048861399 scopus 로고    scopus 로고
    • Intruder theories (ongoing work)
    • Foundations of Software Science and Computation Structures (FoSSaCS'04). Springer
    • H. Comon-Lundh. Intruder theories (ongoing work). In Foundations of Software Science and Computation Structures (FoSSaCS'04), volume 2987 of LNCS, pages 1-4. Springer, 2004.
    • (2004) LNCS , vol.2987 , pp. 1-4
    • Comon-Lundh, H.1
  • 9
    • 28144461037 scopus 로고    scopus 로고
    • Easy intruder deductions
    • Laboratoire Spécification et Vérification, ENS de Cachan, France
    • H. Comon-Lundh and R. Treinen. Easy intruder deductions. Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, 2003.
    • (2003) Technical Report , vol.LSV-03-8
    • Comon-Lundh, H.1    Treinen, R.2
  • 12
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Spring
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, Spring 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 13
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied pi-calculus
    • M. Sagiv, editor, Programming Languages and Systems -Proceedings of the 14th European Symposium on Programming (ESOP'05), Edinburgh, U.K., April. Springer
    • S. Kremer and M. D. Ryan. Analysis of an electronic voting protocol in the applied pi-calculus. In M. Sagiv, editor, Programming Languages and Systems -Proceedings of the 14th European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 186-200, Edinburgh, U.K., April 2005. Springer.
    • (2005) LNCS , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 14
    • 24944560619 scopus 로고    scopus 로고
    • Intruder deduction for ac-like equational theories with homomorphisms
    • Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan, April. Springer
    • P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for ac-like equational theories with homomorphisms. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of LNCS, pages 308-322, Nara, Japan, April 2005. Springer.
    • (2005) LNCS , vol.3467 , pp. 308-322
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems. Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166. Springer, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 18
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors. Academic Press
    • R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 169-180. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-180
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.