메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 400-405

Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus

Author keywords

[No Author keywords available]

Indexed keywords

CODE GENERATION; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC PROTOCOLS; SECURITY ANALYZERS;

EID: 3042621964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2004.1283943     Document Type: Conference Paper
Times cited : (44)

References (15)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols the spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols the spi calculus. Inf. Comput., 1(148):1-70, 1999.
    • (1999) Inf. Comput. , vol.1 , Issue.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 3042538976 scopus 로고    scopus 로고
    • Automatic testing equivalence verification of spi calculus specifications
    • Apr.
    • L. Durante, R. Sisto, and A. Valenzano. Automatic testing equivalence verification of spi calculus specifications. ACM Trans. on Softw. Eng. and Meth., 12(2):222-284, Apr. 2003.
    • (2003) ACM Trans. on Softw. Eng. and Meth. , vol.12 , Issue.2 , pp. 222-284
    • Durante, L.1    Sisto, R.2    Valenzano, A.3
  • 5
    • 0029719080 scopus 로고    scopus 로고
    • Some new attacks upon security protocols
    • G. Lowe, Some new attacks upon security protocols. In 9th IEEE Comp. Sec. Found. Work., pages 162-169, 1996.
    • (1996) 9th IEEE Comp. Sec. Found. Work. , pp. 162-169
    • Lowe, G.1
  • 6
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe, Casper: A compiler for the analysis of security protocols. J. Comput. Secur., 6(1):53-84, 1998.
    • (1998) J. Comput. Secur. , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 7
    • 3042671197 scopus 로고    scopus 로고
    • Automated attack analisys and code generation in a unified, multi-dimensional security protocol engineering framework
    • S. Lukell and C. Veldman. Automated attack analisys and code generation in a unified, multi-dimensional security protocol engineering framework. Comp. Science Hon., 2002.
    • (2002) Comp. Science Hon.
    • Lukell, S.1    Veldman, C.2
  • 8
    • 0002521052 scopus 로고
    • A calculus of mobile processes, parts I and II
    • R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, parts I and II. Inf. Comput., pages 1-77, 1992.
    • (1992) Inf. Comput. , pp. 1-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 9
    • 3042673595 scopus 로고    scopus 로고
    • Cryptographic protocol generation from capsl
    • SRI Int.
    • F. Muller and J. Millen. Cryptographic protocol generation from capsl. Tech. Rep. SRI-CSL-01-07, SRI Int., 2001.
    • (2001) Tech. Rep. , vol.SRI-CSL-01-07
    • Muller, F.1    Millen, J.2
  • 10
    • 3042629222 scopus 로고    scopus 로고
    • Acg - Automatic code generation and automatic implementation of a security protocol
    • Univ. of California
    • A. Perrig, D. Phan, and D. Song. Acg - automatic code generation and automatic implementation of a security protocol. Tech. Rep. 00-1120, Univ. of California, 2000.
    • (2000) Tech. Rep. 00-1120
    • Perrig, A.1    Phan, D.2    Song, D.3
  • 11
    • 3042619670 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analisys
    • Univ. of California and Carnegie Mellon Univ.
    • A. Perrig, D. Song, and S. Berezin. Athena: a novel approach to efficient automatic security protocol analisys. Tech. rep., Univ. of California and Carnegie Mellon Univ.
    • Tech. Rep.
    • Perrig, A.1    Song, D.2    Berezin, S.3
  • 12
    • 3042678362 scopus 로고    scopus 로고
    • Agvi - Automatic generation, verification, and implementation of security protocols
    • Univ. of California
    • D. Phan, A. Perrig, and D. Song. Agvi - automatic generation, verification, and implementation of security protocols. Tech. rep., Univ. of California.
    • Tech. Rep.
    • Phan, D.1    Perrig, A.2    Song, D.3
  • 14
    • 3042671196 scopus 로고    scopus 로고
    • Attack modelling, code generation and performance analysis in a multi-dimensional security protocol engineering framework
    • Univ. of Cape Town
    • C. Veldman, S. Lukell, and A. Hutchison. Attack modelling, code generation and performance analysis in a multi-dimensional security protocol engineering framework. Project report, Univ. of Cape Town, 2002.
    • (2002) Project Report
    • Veldman, C.1    Lukell, S.2    Hutchison, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.