메뉴 건너뛰기




Volumn 2767, Issue , 2003, Pages 224-239

Introducing commutative and associative operators in cryptographic protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MODEL CHECKING;

EID: 33645604225     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (2)

References (21)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols. The spi calculus
    • January
    • Martin Abadi and Andrew D. Gordon. A calculus for cryptographic protocols. The spi calculus. Information and Computation, 148(1):1-70, January 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84874713281 scopus 로고    scopus 로고
    • A framework for the analysis of security protocols
    • Springer-Verlag
    • Michele Boreale and Maria Grazia Buscemi. A framework for the analysis of security protocols. In Proceedings of CONCUR'01. Springer-Verlag, 2002.
    • (2002) Proceedings of CONCUR'01
    • Boreale, M.1    Buscemi, M.G.2
  • 3
    • 0036308321 scopus 로고    scopus 로고
    • Proof techniques for cryptographic processes
    • IEEE Computer Society Press
    • Michele Boreale, Rocco De Nicola, and Rosario Pugliese. Proof techniques for cryptographic processes. In Proceedings of 14th IEEE LICS, pages 157-166. IEEE Computer Society Press, 1999.
    • (1999) Proceedings of 14th IEEE LICS , pp. 157-166
    • Boreale, M.1    De Nicola, R.2    Pugliese, R.3
  • 5
    • 35248859741 scopus 로고    scopus 로고
    • A new knowledge representation strategy for cryptographic protocol analysis
    • Proceedings of TACAS'03, Springer-Verlag, April
    • Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, and Adriano Valenzano. A new knowledge representation strategy for cryptographic protocol analysis. In Proceedings of TACAS'03, volume 2619 of Lecture Notes in Computer Science, pages 284-298. Springer-Verlag, April 2003.
    • (2003) Lecture Notes in Computer Science , vol.2619 , pp. 284-298
    • Bertolotti, I.C.1    Durante, L.2    Sisto, R.3    Valenzano, A.4
  • 6
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • London, Chapman & Hall
    • E. M. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of IFIP PROCOMET, pages 87-106, London, 1998. Chapman & Hall.
    • (1998) Proceedings of IFIP PROCOMET , pp. 87-106
    • Clarke, E.M.1    Jha, S.2    Marrero, W.3
  • 8
    • 84947730957 scopus 로고    scopus 로고
    • Constraint solving and insecurity decision in presence of exclusive or, June 2003
    • H. Comon-Lundh and V. Shmatikov. Constraint solving and insecurity decision in presence of exclusive or, June 2003. To appear in Proc. of 18th IEEE LICS'2003.
    • Proc. of 18th IEEE LICS'2003
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 11
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, Springer-Verlag
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In T. Margaria and B. Steffen, editors, Proceedings of TACAS'96, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 12
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE Computer Society Press, June
    • Gavin Lowe. Casper: a compiler for the analysis of security protocols. In Proceedings of 10th IEEE CSFW, pages 18-30. IEEE Computer Society Press, June 1997.
    • (1997) Proceedings of 10th IEEE CSFW , pp. 18-30
    • Lowe, G.1
  • 13
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking security protocols
    • Gavin Lowe. Towards a completeness result for model checking security protocols. Journal of Computer Security, 7(2-3):89-146, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 15
    • 18544366384 scopus 로고    scopus 로고
    • A unification algorithm for the group Diffie-Hellman protocol
    • Catherine Meadows and Paliath Narendran. A unification algorithm for the group Diffie-Hellman protocol. In Proceedings of WITS'02, 2002.
    • (2002) Proceedings of WITS'02
    • Meadows, C.1    Narendran, P.2
  • 16
    • 70349714960 scopus 로고    scopus 로고
    • Symbolic protocol analysis with products and Diffie-Hellman exponentiation
    • June
    • Jonathan Millen and Vitaly Shmatikov. Symbolic protocol analysis with products and Diffie-Hellman exponentiation, June 2003. To appear in Proc. of 16th IEEE CSFW.
    • (2003) Proc. of 16th IEEE CSFW
    • Millen, J.1    Shmatikov, V.2
  • 18
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Sixth International Static Analysis Symposium (SAS'99), Springer Verlag
    • David Monniaux. Abstracting cryptographic protocols with tree automata. In Sixth International Static Analysis Symposium (SAS'99), number 1694 in Lecture Notes in Computer Science, pages 149-163. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , Issue.1694 , pp. 149-163
    • Monniaux, D.1
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • IEEE Computer Society Press, June
    • Michaël Rusinowitch and Mathieu Turuani. Protocol insecurity with finite number of sessions is NP-complete. In Proceedings of 14th IEEE CSFW, pages 174-187. IEEE Computer Society Press, June 2001.
    • (2001) Proceedings of 14th IEEE CSFW , pp. 174-187
    • Rusinowitch, M.1    Turuani, M.2
  • 21
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • September
    • Steve Schneider. Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741-758, September 1998.
    • (1998) IEEE Transactions on Software Engineering , vol.24 , Issue.9 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.