메뉴 건너뛰기




Volumn 12, Issue 3-4 SPEC. ISS., 2004, Pages 435-483

Types and effects for asymmetric cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA REDUCTION; FORMAL LOGIC; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; THEOREM PROVING;

EID: 3042660681     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-123-406     Document Type: Conference Paper
Times cited : (65)

References (37)
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theoretical Computer Science 298(3) (2003), 387-415.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), 1-70.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 14
    • 0034835462 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • IEEE Computer Society Press
    • A.D. Gordon and A. Jeffrey, Authenticity by typing for security protocols, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 145-159. Extended version to appear in J. Computer Security.
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 145-159
    • Gordon, A.D.1    Jeffrey, A.2
  • 15
    • 0034835462 scopus 로고    scopus 로고
    • Extended version to appear
    • A.D. Gordon and A. Jeffrey, Authenticity by typing for security protocols, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 145-159. Extended version to appear in J. Computer Security.
    • J. Computer Security
  • 16
    • 25944460630 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • Microsoft Research, August
    • A.D. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Technical Report MSR-TR-2002-31, Microsoft Research, August, 2002.
    • (2002) Technical Report , vol.MSR-TR-2002-31
    • Gordon, A.D.1    Jeffrey, A.2
  • 17
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • IEEE Computer Society Press
    • A.D. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2002, pp. 77-91.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 77-91
    • Gordon, A.D.1    Jeffrey, A.2
  • 18
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A.D. Gordon and A. Jeffrey, Typing correspondence assertions for communication protocols, Theoretical Computer Science 300 (2003), 379-409.
    • (2003) Theoretical Computer Science , vol.300 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 19
    • 3042597797 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • ACM Press
    • A.D. Gordon and R. Pucella, Validating a web service security abstraction by typing, in: 2002 ACM Workshop on XML Security, ACM Press, 2002, pp. 62-73. An extended version appears as Technical Report MSR-TR-2002-108, Microsoft Research, December, 2002.
    • (2002) 2002 ACM Workshop on XML Security , pp. 62-73
    • Gordon, A.D.1    Pucella, R.2
  • 20
    • 0003610530 scopus 로고    scopus 로고
    • An extended version appears, Microsoft Research, December
    • A.D. Gordon and R. Pucella, Validating a web service security abstraction by typing, in: 2002 ACM Workshop on XML Security, ACM Press, 2002, pp. 62-73. An extended version appears as Technical Report MSR-TR-2002-108, Microsoft Research, December, 2002.
    • (2002) Technical Report , vol.MSR-TR-2002-108
  • 21
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J.D. Guttman and F.J. Thayer, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 23
    • 0033683607 scopus 로고    scopus 로고
    • Towards automatic verification of authentication protocols on an unbounded network
    • IEEE Computer Society Press
    • J. Heather and S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000, pp. 132-143.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 132-143
    • Heather, J.1    Schneider, S.2
  • 25
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press
    • G. Lowe, A hierarchy of authentication specifications, in: 10th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1997, pp. 31-43.
    • (1997) 10th IEEE Computer Security Foundations Workshop , pp. 31-43
    • Lowe, G.1
  • 27
    • 0003610530 scopus 로고    scopus 로고
    • Preliminary version appears as, Carnegie Mellon University, May
    • W. Marrero, E.M. Clarke and S. Jha, Model checking for security protocols, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May, 1997.
    • (1997) Technical Report , vol.TR-CMU-CS-97-139
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 31
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 32
    • 0035072287 scopus 로고    scopus 로고
    • Athena, a novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin and A. Perrig, Athena, a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.