메뉴 건너뛰기




Volumn 12, Issue 3-4 SPEC. ISS., 2004, Pages 409-433

Authentication tests and disjoint encryption: A design method for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA ACQUISITION; ELECTRONIC COMMERCE; ELECTRONIC DATA INTERCHANGE; LOGIC DESIGN; NETWORK PROTOCOLS;

EID: 3042563843     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-123-405     Document Type: Conference Paper
Times cited : (24)

References (24)
  • 2
    • 33750247207 scopus 로고    scopus 로고
    • Verifying the SET purchase protocols
    • Cambridge University Computer Laboratory
    • G. Bella, F. Massacci and L.C. Paulson, Verifying the SET purchase protocols. Technical report, Cambridge University Computer Laboratory, 2001. Short version appeared in International Joint Conference on Automated Reasoning, 2001. Available at http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html.
    • (2001) Technical Report
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 3
    • 3042641705 scopus 로고    scopus 로고
    • Short version appeared
    • G. Bella, F. Massacci and L.C. Paulson, Verifying the SET purchase protocols. Technical report, Cambridge University Computer Laboratory, 2001. Short version appeared in International Joint Conference on Automated Reasoning, 2001. Available at http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html.
    • (2001) International Joint Conference on Automated Reasoning
  • 4
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93 Proceedings, Springer-Verlag, 1993. Full version available at http://www-cse.ucsd.edu/users/mihir/papers/eakd.ps.
    • (1993) Advances in Cryptology - Crypto'93 Proceedings
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • Foundations of Security Analysis and Design, R. Gorrieri and R. Focardi, eds, Springer-Verlag
    • J.D. Guttman, Security goals: Packet trajectories and strand spaces, in: Foundations of Security Analysis and Design, R. Gorrieri and R. Focardi, eds, Volume 2171 of LNCS, Springer-Verlag, 2001, pp. 197-261.
    • (2001) LNCS , vol.2171 , pp. 197-261
    • Guttman, J.D.1
  • 12
    • 3042635426 scopus 로고    scopus 로고
    • The faithfulness of abstract protocol analysis: Message authentication
    • Forthcoming
    • J.D. Guttman, F.J. Thayer and L.D. Zuck, The faithfulness of abstract protocol analysis: Message authentication, Journal of Computer Security (2003) (Forthcoming).
    • (2003) Journal of Computer Security
    • Guttman, J.D.1    Thayer, F.J.2    Zuck, L.D.3
  • 17
    • 0344875574 scopus 로고    scopus 로고
    • Analyzing protocols subject to guessing attacks
    • G. Lowe, Analyzing protocols subject to guessing attacks, Journal of Computer Security 12(1) (2004), 83-97.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 83-97
    • Lowe, G.1
  • 18
    • 0037251070 scopus 로고    scopus 로고
    • Posets and protocols: Picking the right three-party protocol
    • S.-L. Ng, Posets and protocols: Picking the right three-party protocol, IEEE Journal on Selected Areas in Communication (January) (2003), 55-61.
    • (2003) IEEE Journal on Selected Areas in Communication , Issue.JANUARY , pp. 55-61
    • Ng, S.-L.1
  • 19
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society Press
    • A. Perrig and D.X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000.
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Song, D.X.2
  • 21
  • 23
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, Computer 25(1) (1992), 39-52.
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 24
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T.Y.C. Woo and S.S. Lam, A lesson on authentication protocol design, Operating Systems Review, 1994, pp. 24-37.
    • (1994) Operating Systems Review , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.