메뉴 건너뛰기




Volumn 8, Issue 1, 2006, Pages 57-76

Pattern-based abstraction for verifying secrecy in protocols

Author keywords

Abstract interpretation; Cryptographic protocols; Security; Verification; Widening

Indexed keywords


EID: 31744452239     PISSN: 14332779     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10009-005-0189-6     Document Type: Article
Times cited : (8)

References (37)
  • 1
    • 84957668700 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Theoretical aspects of computer software. Springer, Berlin Heidelberg New York
    • Abadi M (1997) Secrecy by typing in security protocols. In: Theoretical aspects of computer software. Lecture notes in computer science, vol 1281. Springer, Berlin Heidelberg New York, pp 611-638
    • (1997) Lecture Notes in Computer Science , vol.1281 , pp. 611-638
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Foundations of software science and computation structures. Springer, Berlin Heidelberg New York
    • Abadi M, Blanchet B (2001) Secrecy types for asymmetric communication. In: Foundations of software science and computation structures. Lecture notes in computer science, vol 2030. Springer, Berlin Heidelberg New York, pp 25-41
    • (2001) Lecture Notes in Computer Science , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • CONCUR: 13th international conference on concurrency theory. Springer, Berlin Heidelberg New York
    • Amadio RM, Charatonik W (2002) On name generation and set-based analysis in the Dolev-Yao model. In: CONCUR: 13th international conference on concurrency theory. Lecture notes in computer science, vol 2421. Springer, Berlin Heidelberg New York
    • (2002) Lecture Notes in Computer Science , vol.2421
    • Amadio, R.M.1    Charatonik, W.2
  • 5
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • International conference on concurrency theory. Springer, Berlin Heidelberg New York
    • Amadio RM, Lugiez D (2000) On the reachability problem in cryptographic protocols. In: International conference on concurrency theory. Lecture notes in computer science, vol 1877. Springer, Berlin Heidelberg New York, pp 380-394
    • (2000) Lecture Notes in Computer Science , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 7
    • 24644497304 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols by prolog rules
    • International Symposium on static analysis. Springer, Berlin Heidelberg New York
    • Blanchet B (2001) Abstracting cryptographic protocols by prolog rules. In: International Symposium on static analysis. Lecture notes in computer science, vol 2126. Springer, Berlin Heidelberg New York, pp 433-436
    • (2001) Lecture Notes in Computer Science , vol.2126 , pp. 433-436
    • Blanchet, B.1
  • 9
    • 31744452138 scopus 로고    scopus 로고
    • Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols
    • International conference on computer-aided verification. Springer, Berlin Heidelberg New York
    • Bolignano D (1998) Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols. In: International conference on computer-aided verification. Lecture notes in computer science, vol 1427. Springer, Berlin Heidelberg New York, pp 77-87
    • (1998) Lecture Notes in Computer Science , vol.1427 , pp. 77-87
    • Bolignano, D.1
  • 10
    • 35048883478 scopus 로고    scopus 로고
    • On the existence of an effective and complete proof system for bounded security protocols
    • FOSSACS. Springer, Berlin Heidelberg New York
    • Bozga L, Ene C, Lakhnech Y (2004) On the existence of an effective and complete proof system for bounded security protocols. In: FOSSACS. Lecture notes in computer science, vol 2987. Springer, Berlin Heidelberg New York
    • (2004) Lecture Notes in Computer Science , vol.2987
    • Bozga, L.1    Ene, C.2    Lakhnech, Y.3
  • 11
    • 31744438276 scopus 로고    scopus 로고
    • A symbolic decision procedure for bounded security protocols with time stamps
    • Technical report, Verimag, Gières, France
    • Bozga L, Ene C, Lakhnech Y (2004) A symbolic decision procedure for bounded security protocols with time stamps. Technical report, Verimag, Gières, France
    • (2004)
    • Bozga, L.1    Ene, C.2    Lakhnech, Y.3
  • 14
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • International colloquium on automata, languages and programming. Springer, Berlin Heidelberg New York
    • Comon H, Cortier V, Mitchell J (2001) Tree automata with one memory, set constraints, and ping-pong protocols. In: International colloquium on automata, languages and programming. Lecture notes in computer science, vol 2076. Springer, Berlin Heidelberg New York
    • (2001) Lecture Notes in Computer Science , vol.2076
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 15
    • 14844290049 scopus 로고    scopus 로고
    • Is it possible to decide whether a cryptographic protocol is secure or not?
    • Comon H, Shmatikov V (2002) Is it possible to decide whether a cryptographic protocol is secure or not? J Telecommun Inf Technol 4:5-15
    • (2002) J Telecommun Inf Technol , vol.4 , pp. 5-15
    • Comon, H.1    Shmatikov, V.2
  • 16
    • 1442311384 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • Comon-Lundh H, Cortier V (2004) Security properties: Two agents are sufficient. Sci Comput Programm 50(1-3):51-71
    • (2004) Sci Comput Programm , vol.50 , Issue.1-3 , pp. 51-71
    • Comon-Lundh, H.1    Cortier, V.2
  • 18
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198-208
    • (1983) IEEE Trans Inf Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 20
    • 0004170287 scopus 로고
    • On the security of multi-party ping pong protocols
    • Technical report, Israel Institute of Technology
    • Even S, Goldreich O (1983) On the security of multi-party ping pong protocols. Technical report, Israel Institute of Technology
    • (1983)
    • Even, S.1    Goldreich, O.2
  • 22
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • International conference on automated deduction. Springer, Berlin Heidelberg New York
    • Genet T, Klay F (2000) Rewriting for cryptographic protocol verification. In: International conference on automated deduction. Lecture notes in computer science, vol 1831. Springer, Berlin Heidelberg New York
    • (2000) Lecture Notes in Computer Science , vol.1831
    • Genet, T.1    Klay, F.2
  • 24
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification
    • International workshop on formal methods for parallel programming: theory and applications. Springer, Berlin Heidelberg New York
    • Goubault-Larrecq J (2000) A method for automatic cryptographic protocol verification. In: International workshop on formal methods for parallel programming: Theory and applications. Lecture notes in computer science, vol 1800. Springer, Berlin Heidelberg New York
    • (2000) Lecture Notes in Computer Science , vol.1800
    • Goubault-Larrecq, J.1
  • 25
    • 31744439819 scopus 로고    scopus 로고
    • Automatic verification of confidentiality properties of cryptographic program
    • El Khadi N (2001) Automatic verification of confidentiality properties of cryptographic program. Netw Inf Syst J 6:4-15
    • (2001) Netw Inf Syst J , vol.6 , pp. 4-15
    • El Khadi, N.1
  • 26
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentification protocol
    • Lowe G (1995) An attack on the Needham-Schroeder public-key authentification protocol. Inf Process Lett 56(3):131-133
    • (1995) Inf Process Lett , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 27
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
    • Tools and algorithms for the construction and analysis of systems. Springer, Berlin Heidelberg New York
    • Lowe G (1996) Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR. In: Tools and algorithms for the construction and analysis of systems. Lecture notes in computer science, vol 1055. Springer, Berlin Heidelberg New York, pp 147-166
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 28
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Washington Brussels Tokyo, June 1997
    • Lowe G (1997) Casper: A compiler for the analysis of security protocols. In: 10th IEEE workshop on computer security foundations (CSFW '97), Washington Brussels Tokyo, June 1997, pp 18-30
    • (1997) 10th IEEE Workshop on Computer Security Foundations (CSFW '97) , pp. 18-30
    • Lowe, G.1
  • 29
    • 0033682446 scopus 로고    scopus 로고
    • Invariant generation techniques in cryptographic protocol analysis
    • Meadows C (2000) Invariant generation techniques in cryptographic protocol analysis. In: Workshop on computer security foundations
    • (2000) Workshop on Computer Security Foundations
    • Meadows, C.1
  • 32
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Symposium on static analysis. Springer, Berlin Heidelberg New York
    • Monniaux D (1999) Abstracting cryptographic protocols with tree automata. In: Symposium on static analysis. Lecture notes in computer science, vol 1694. Springer, Berlin Heidelberg New York, pp 149-163
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 149-163
    • Monniaux, D.1
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993-999
    • (1978) Commun ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 37
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • International conference on automated deduction. Springer, Berlin Heidelberg New York
    • Weidenbach C (1999) Towards an automatic analysis of security protocols in first-order logic. In: International conference on automated deduction. Lecture notes in computer science, vol 1632. Springer, Berlin Heidelberg New York, pp 314-328
    • (1999) Lecture Notes in Computer Science , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.