메뉴 건너뛰기




Volumn 3705 LNCS, Issue , 2005, Pages 163-181

A formal semantics for protocol narrations

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INFORMATION DISSEMINATION; NETWORK PROTOCOLS; TRANSLATION (LANGUAGES);

EID: 33646198427     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11580850_10     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 0002652530 scopus 로고    scopus 로고
    • Security Protocols and their Properties
    • [Aba00]. NATO ASI, IOS Press
    • [Aba00] M. Abadi. Security Protocols and their Properties. In Foundations of Secure Computation, pages 39-60. NATO ASI, IOS Press, 2000.
    • (2000) Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • [AG99]
    • [AG99] M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 35048863862 scopus 로고    scopus 로고
    • Symbolic bisimulation in the spi calculus
    • [BBN04]. Proceedings of CONCUR 2004, Springer, Sept.
    • [BBN04] J. Borgström, S. Briais and U. Nestmann. Symbolic Bisimulation in the Spi Calculus. In Proceedings of CONCUR 2004, volume 3170 of LNCS, pages 161-176. Springer, Sept. 2004.
    • (2004) LNCS , vol.3170 , pp. 161-176
    • Borgström, J.1    Briais, S.2    Nestmann, U.3
  • 6
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • [BMV03], LNCS 2808, Springer-Verlag, Heidelberg
    • [BMV03] D. Basin, S. Mödersheim and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Proceedings of ESORICS'03, LNCS 2808, pages 253-270. Springer-Verlag, Heidelberg, 2003.
    • (2003) Proceedings of ESORICS'03 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 8
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • [CJ97], University of York
    • [CJ97] J. A. Clark and J. L. Jacob. A survey of authentication protocol literature. Technical Report 1.0, University of York, 1997.
    • (1997) Technical Report 1.0
    • Clark, J.A.1    Jacob, J.L.2
  • 9
    • 24944514681 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • [CM05]. Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings)
    • [CM05] C. Cremers and S. Mauw. Operational Semantics of Security Protocols. In Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings), volume 3466 of LNCS, 2005.
    • (2005) LNCS , vol.3466
    • Cremers, C.1    Mauw, S.2
  • 10
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [DY83], Mar.
    • [DY83] D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 12
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • [JRV00]. Logic for Programming and Automated Reasoning, Springer-Verlag, November
    • [JRV00] F. Jacquemard, M. Rusinowitch and L. Vigneron. Compiling and Verifying Security Protocols. In Logic for Programming and Automated Reasoning, volume 1955 of LNCS, pages 131-160. Springer-Verlag, November 2000.
    • (2000) LNCS , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 13
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • [Low98]
    • [Low98] G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 16
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • [Pau98]
    • [Pau98] L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 17
    • 33646178885 scopus 로고    scopus 로고
    • Translating security protocols from informal notation into spi calculus
    • [STY05]. Written in Japanese, abstract in English. To appear
    • [STY05] E. Sumii, H. Tatsuzawa and A. Yonezawa. Translating Security Protocols from Informal Notation into Spi Calculus. IPSJ Transactions on Programming, 45, 2005. Written in Japanese, abstract in English. To appear.
    • (2005) IPSJ Transactions on Programming , vol.45
    • Sumii, E.1    Tatsuzawa, H.2    Yonezawa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.