메뉴 건너뛰기




Volumn 12, Issue 3-4 SPEC. ISS., 2004, Pages 379-408

Embedding agents within the intruder to detect parallel attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; EMBEDDED SYSTEMS; ENCODING (SYMBOLS); MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROBLEM SOLVING; SOFTWARE AGENTS; STATE SPACE METHODS;

EID: 3042610243     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-123-404     Document Type: Conference Paper
Times cited : (3)

References (24)
  • 1
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society
    • B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2001, pp. 82-96.
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 2
    • 1242331182 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • Springer-Verlag
    • B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium, Springer-Verlag, 2002, pp. 242-259.
    • (2002) 9th International Static Analysis Symposium , pp. 242-259
    • Blanchet, B.1
  • 6
    • 26444446875 scopus 로고    scopus 로고
    • Capturing parallel attacks within the data independence framework
    • IEEE Computer Society
    • P.J. Broadfoot and A.W. Roscoe, Capturing parallel attacks within the data independence framework, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2002, pp. 147-159.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 147-159
    • Broadfoot, P.J.1    Roscoe, A.W.2
  • 8
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature: Version 1.0
    • University of York
    • J.A. Clark and J.L. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, University of York, 1997.
    • (1997) Technical Report
    • Clark, J.A.1    Jacob, J.L.2
  • 13
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security 6 (1998), 53-84.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 14
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows, The NRL Protocol Analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 16
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998).
    • (1998) Journal of Computer Security , vol.6
    • Paulson, L.1
  • 18
    • 0031634193 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A.W. Roscoe, Proving security protocols with model checkers by data independence techniques, in: 11th IEEE Computer Security Foundations Workshop, 1998, pp. 84-95.
    • (1998) 11th IEEE Computer Security Foundations Workshop , pp. 84-95
    • Roscoe, A.W.1
  • 20
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A.W. Roscoe and P.J. Broadfoot, Proving security protocols with model checkers by data independence techniques, Journal of Computer Security 7(2,3) (1999), pp. 147-190.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 23
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D.X. Song, S. Berezin and A. Perrig, Athena: A novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.