메뉴 건너뛰기




Volumn 142, Issue SPEC. ISS., 2006, Pages 99-110

Compositionality of security protocols: A research agenda

Author keywords

Compositionality; Formal methods; Security properties; Security protocol analysis

Indexed keywords

COMPUTER SCIENCE; RESEARCH AND DEVELOPMENT MANAGEMENT; SECURITY OF DATA;

EID: 29244485874     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.12.047     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 3
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Report 2000/067 eprint.iacr.org/
    • Canetti, R., Universally composable security: A new paradigm for cryptographic protocols, Cryptology ePrint Archive, Report 2000/067 (2000), eprint.iacr.org/
    • (2000) Cryptology EPrint Archive
    • Canetti, R.1
  • 5
    • 24944551065 scopus 로고    scopus 로고
    • Checking secrecy by means of partial order reduction
    • D. Amyot and A. Williams, editors, SAM 2004: Security Analysis and Modelling
    • Cremers, C. and S. Mauw, Checking secrecy by means of partial order reduction, in: D. Amyot and A. Williams, editors, SAM 2004: Security Analysis and Modelling, 4th Workshop on SDL and MSC (2004), pp. 177-194. URL http://www.win.tue.nl/~ecss/downloads/cm_secrecyreduction.pdf
    • (2004) 4th Workshop on SDL and MSC , pp. 177-194
    • Cremers, C.1    Mauw, S.2
  • 6
    • 29244470630 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • Dagstuhl 03371 post-seminar proceedings: Scenarios: Models, Algorithms and Tools to be published
    • Cremers, C. and S. Mauw, Operational semantics of security protocols, in: Dagstuhl 03371 post-seminar proceedings: Scenarios: Models, Algorithms and Tools, LNCS, 2004, to be published
    • (2004) LNCS
    • Cremers, C.1    Mauw, S.2
  • 10
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/NSFDR.ps
    • Lowe, G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Proceedings of TACAS 1055 (1996), pp. 147-166, URL web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/NSFDR.ps
    • (1996) Proceedings of TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.