메뉴 건너뛰기




Volumn , Issue , 2005, Pages 112-125

Analysis of typed analyses of authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; CIPHERTEXT; CRYPTOGRAPHIC KEYS;

EID: 28144464907     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2005.8     Document Type: Conference Paper
Times cited : (19)

References (17)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, 1999.
    • (1999) JACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theor. Comput. Sci., 298(3):387-415, 2003.
    • (2003) Theor. Comput. Sci. , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 6
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Proceedings of European Symposium on Programming (ESOP 2004). Springer-Verlag
    • M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In Proceedings of European Symposium on Programming (ESOP 2004), volume 2986 of Lecture Notes in Computer Science, pages 140-154. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 8
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security. 11(4):677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 9
    • 28144448905 scopus 로고    scopus 로고
    • Inferring authentication tags
    • January, ACM SIGPLAN and GI FoMSESS Workshop on Issues on the Theory of Security (WITS 2005)
    • R. Focardi, M. Maffei, and F. Placella. Inferring authentication tags. January 2005. In ACM Digital Library Proceedings of IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues on the Theory of Security (WITS 2005).
    • (2005) ACM Digital Library Proceedings of IFIP WG 1.7
    • Focardi, R.1    Maffei, M.2    Placella, F.3
  • 11
    • 28144442101 scopus 로고    scopus 로고
    • Personal communication. January
    • A. Gordon and A. Jeffrey. Personal communication. January 2005.
    • (2005)
    • Gordon, A.1    Jeffrey, A.2
  • 12
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.1    Jeffrey, A.2
  • 13
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. J. Comput. Secur., 11(4):451-519, 2004.
    • (2004) J. Comput. Secur. , vol.11 , Issue.4 , pp. 451-519
    • Gordon, A.D.1    Jeffrey, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.