메뉴 건너뛰기




Volumn 3233, Issue , 2004, Pages 65-86

Inferences on honesty in compositional logic for protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTERS;

EID: 30844436780     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-37621-7_4     Document Type: Article
Times cited : (2)

References (19)
  • 1
    • 0004215976 scopus 로고
    • A Logic of Authentication
    • Digital System Research Center
    • M. Burrows, M. Abadi and R. Needham. A Logic of Authentication. Technical Report 39, Digital System Research Center, 1989.
    • (1989) Technical Report , vol.39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 35248852076 scopus 로고    scopus 로고
    • A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis
    • M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Springer-Verlag
    • I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell and A. Scedrov. A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Lecture Notes in Computer Science, Hot Topics, vol.2609, Springer-Verlag, pp.356-382, 2003.
    • (2003) Lecture Notes in Computer Science, Hot Topics , vol.2609 , pp. 356-382
    • Cervesato, I.1    Durgin, N.A.2    Lincoln, P.D.3    Mitchell, J.C.4    Scedrov, A.5
  • 11
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, vol.11, no.4, pp.677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 13
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J. D. Guttman and F. J. T. Fdbrega. Authentication tests and the structure of bundles. Theoretical Computer Science, vol. 283(2), pp.333-380, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Fdbrega, F.J.T.2
  • 14
    • 35048859061 scopus 로고    scopus 로고
    • A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic
    • M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Springer-Verlag
    • K. Hasebe and M. Okada. A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa (eds.), Software Security -Theories and Systems, Lecture Notes in Computer Science, Hot Topics, vol.2609, Springer-Verlag, pp.417-440, 2003.
    • (2003) Lecture Notes in Computer Science, Hot Topics , vol.2609 , pp. 417-440
    • Hasebe, K.1    Okada, M.2
  • 16
    • 0038629629 scopus 로고
    • Entity Authentication Mechanisms - Part 3: Entity Authentication Using Asymmetric Techniques
    • ISO/IEC
    • IEEE. Entity Authentication Mechanisms - part 3: Entity Authentication Using Asymmetric Techniques. Technical report ISO/IEC IS 9798-3, ISO/IEC, 1993.
    • (1993) Technical Report , vol.ISO-IEC IS 9798-3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.