메뉴 건너뛰기




Volumn , Issue , 2005, Pages 219-235

Deciding knowledge properties of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SEMANTICS;

EID: 32144452580     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 3
    • 0037421015 scopus 로고    scopus 로고
    • A new logic for electronic commerce protocols
    • Kamel Adi, Mourad Debbabi, and Mohamed Mejri. A new logic for electronic commerce protocols. Theoretical Computer Science, 29(3):223-283, 2003.
    • (2003) Theoretical Computer Science , vol.29 , Issue.3 , pp. 223-283
    • Adi, K.1    Debbabi, M.2    Mejri, M.3
  • 4
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • Computer Science Today
    • Ross Anderson and Roger M. Needham. Programming Satan's computer. In Computer Science Today, volume 1000 of Lecture Notes in Computer Science, pages 426-441, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1000 , pp. 426-441
    • Anderson, R.1    Needham, R.M.2
  • 5
    • 0037237984 scopus 로고    scopus 로고
    • Inductive verification of smartcard protocols
    • Giampaolo Bella. Inductive Verification of Smartcard Protocols. Journal of Computer Security, 11(1):87-132, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 87-132
    • Bella, G.1
  • 6
    • 35248878042 scopus 로고    scopus 로고
    • Verification of Cryptographic Protocols: Tagging Enforces Termination
    • Andrew D. Gordon, editor, Proceedings of FoSSaCS'03
    • Bruno Blanchet and Andreas Podelski. Verification of Cryptographic Protocols: Tagging Enforces Termination. In Andrew D. Gordon, editor, Proceedings of FoSSaCS'03, volume 2620 of Lecture Notes in Computer Science, pages 136-152, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 8
    • 2642548302 scopus 로고    scopus 로고
    • Secure protocol composition
    • Proceedings of 19th Conference on Mathematical Foundations of Programming Semantics
    • Anupam Datta, A. Derek, John C. Mitchell, and Dusko Pavlovic. Secure protocol composition. In Proceedings of 19th Conference on Mathematical Foundations of Programming Semantics, volume 83 of Electronic Notes in Theoretical Computer Science, 2003.
    • (2003) Electronic Notes in Theoretical Computer Science , vol.83
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 9
    • 5644231064 scopus 로고    scopus 로고
    • Using temporal logics of knowledge in the formal verification of security protocols
    • July
    • Clare Dixon, M. Carmel Fernandez Gago, Michael Fisher, and Wiebe van der Hoek. Using Temporal Logics of Knowledge in the Formal Verification of Security Protocols. In Proceedings of TIME 2004, July 2004.
    • (2004) Proceedings of TIME 2004
    • Dixon, C.1    Gago, M.C.F.2    Fisher, M.3    Van Hoek, W.D.4
  • 12
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • Nancy A. Durgin, John C. Mitchell, and Dusko Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(4):677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.A.1    Mitchell, J.C.2    Pavlovic, D.3
  • 13
    • 0004170287 scopus 로고
    • On the security of multi-party ping-pong protocols
    • Technion - Israel Institute of Technology
    • Shimon Even and Oded Goldreich. On the security of multi-party ping-pong protocols. Technical Report 285, Technion - Israel Institute of Technology, 1983.
    • (1983) Technical Report , vol.285
    • Even, S.1    Goldreich, O.2
  • 15
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
    • Li Gong, Roger Needham, and Raphael Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 16
    • 35248868917 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for security protocol analysis
    • Formal Aspects of Security, First International Conference, FASec 2002
    • Joseph Y. Halpern and Riccardo Pucella. Modeling adversaries in a logic for security protocol analysis. In Formal Aspects of Security, First International Conference, FASec 2002, volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2629 , pp. 115-132
    • Halpern, J.Y.1    Pucella, R.2
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public key protocol using FDR
    • Proceedings of TACAS'96
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public key protocol using FDR. In Proceedings of TACAS'96, volume 1055 of Lecture Notes in Computer Science, pages 147-166, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of computer security, 7:89-146, 1999.
    • (1999) Journal of Computer Security , vol.7 , pp. 89-146
    • Lowe, G.1
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Roger M. Needham and Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 23
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi and Needham logic
    • D. M. Nessett. A critique of the Burrows, Abadi and Needham logic. ACM Operating systems review, 24(2):35-38, 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of computer security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 26
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • R. Ramanujam and S.P.Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1):135-165, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-165
    • Ramanujam, R.1    Suresh, S.P.2
  • 27
    • 35248886574 scopus 로고    scopus 로고
    • Tagging makes secrecy decidable for unbounded nonces as well
    • Mumbai, India, December
    • R. Ramanujam and S.P. Suresh. Tagging makes secrecy decidable for unbounded nonces as well. In Proceedings of 23rd FST&TCS, volume 2914, pages 363-374, Mumbai, India, December 2003.
    • (2003) Proceedings of 23rd FST&TCS , vol.2914 , pp. 363-374
    • Ramanujam, R.1    Suresh, S.P.2
  • 28
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • Michael Rusinowitch and Mathieu Turuani. Protocol insecurity with finite number of sessions is NP-complete. Theoretical Computer Science, 299:451-475, 2003.
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 29
    • 11944274424 scopus 로고    scopus 로고
    • PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November. Madras University
    • S.P. Suresh. Foundations of Security Protocol Analysis. PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November 2003. Madras University. Available at http://www.cmi.ac.in/~spsuresh.
    • (2003) Foundations of Security Protocol Analysis.
    • Suresh, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.