메뉴 건너뛰기




Volumn 3835 LNAI, Issue , 2005, Pages 549-564

Algebraic intruder deductions

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTER CRIME; CRYPTOGRAPHY; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33646262130     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11591191_38     Document Type: Conference Paper
Times cited : (22)

References (28)
  • 1
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • LNCS 3142, Springer
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proceedings of ICALP'2004, LNCS 3142, pp. 46-58. Springer, 2004.
    • (2004) Proceedings of ICALP'2004 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 2
    • 28144451656 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under (many more) equational theories
    • IEEE Computer Society Press
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under (many more) equational theories. In Proceedings of CSFW'05, pp. 62-76. IEEE Computer Society Press, 2005.
    • (2005) Proceedings of CSFW'05 , pp. 62-76
    • Abadi, M.1    Cortier, V.2
  • 3
    • 84954313527 scopus 로고    scopus 로고
    • Automatic SAT-compilation of protocol insecurity problems via reduction to planning
    • LNCS 2529. Springer
    • A. Armando and L. Compagna. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In Proceedings of FORTE 2002, LNCS 2529, pp. 210-225. Springer, 2002.
    • (2002) Proceedings of FORTE 2002 , pp. 210-225
    • Armando, A.1    Compagna, L.2
  • 5
    • 0030078047 scopus 로고    scopus 로고
    • Unification in the union of disjoint equational theories: Combining decision procedures
    • F. Baader and K.U. Schulz. Unification in the union of disjoint equational theories: Combining decision procedures. Journal of Symbolic Computation, 21:211-243, 1996.
    • (1996) Journal of Symbolic Computation , vol.21 , pp. 211-243
    • Baader, F.1    Schulz, K.U.2
  • 8
    • 18744415053 scopus 로고    scopus 로고
    • Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
    • ACM Press
    • D. Basin, S. Mödersheim, and L. Viganò. Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In Proceedings of CCS'03, pp. 335-344. ACM Press, 2003.
    • (2003) Proceedings of CCS'03 , pp. 335-344
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 9
    • 33745455203 scopus 로고    scopus 로고
    • Algebraic intruder deductions (extended version)
    • Dep. of Computer Science, ETH Zurich
    • D. Basin, S. Mödersheim, and L. Viganò. Algebraic Intruder Deductions (Extended Version). Technical Report 485, Dep. of Computer Science, ETH Zurich, 2005. Available at www.infsec.ethz.ch.
    • (2005) Technical Report , vol.485
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 11
    • 84874713281 scopus 로고    scopus 로고
    • A framework for the analysis of security protocols
    • LNCS 2421. Springer
    • M. Boreale and M. G. Buscemi. A framework for the analysis of security protocols. In Proceedings of CONCUR 2002, LNCS 2421, pp. 483-498. Springer, 2002.
    • (2002) Proceedings of CONCUR 2002 , pp. 483-498
    • Boreale, M.1    Buscemi, M.G.2
  • 12
    • 0041967380 scopus 로고    scopus 로고
    • An NP decision procedure for protocol insecurity with XOR
    • IEEE Computer Society Press
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proceedings of LICS'03, pp. 261-270. IEEE Computer Society Press, 2003.
    • (2003) Proceedings of LICS'03 , pp. 261-270
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 13
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with diffie-hellman exponentiation and products in exponents
    • LNCS 2914. Springer
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In Proceedings of FST TCS'03, LNCS 2914, pp. 124-135. Springer, 2003.
    • (2003) Proceedings of FST TCS'03 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 16
    • 24944569389 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • LNCS 3467. Springer
    • H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proceedings of RTA '05, LNCS 3467, pp. 294-307. Springer, 2005.
    • (2005) Proceedings of RTA '05 , pp. 294-307
    • Comon-Lundh, H.1    Delaune, S.2
  • 18
    • 14844335720 scopus 로고    scopus 로고
    • A decision procedure for the verification of security protocols with explicit destructors
    • ACM Press
    • S. Delaune and F. Jacquemard. A decision procedure for the verification of security protocols with explicit destructors. In Proceedings of CCS'04, pp. 278-287. ACM Press, 2004.
    • (2004) Proceedings of CCS'04 , pp. 278-287
    • Delaune, S.1    Jacquemard, F.2
  • 21
    • 33745469606 scopus 로고    scopus 로고
    • IETF: The Internet Engineering Task Force. http://www.ietf.org.
  • 22
    • 0001686885 scopus 로고
    • Completion of a set of rules modulo a set of equations
    • J.-P. Jouannaud and H. Kirchner. Completion of a set of rules modulo a set of equations. SIAM Journal of Computing, 15(4):1155-1194, 1986.
    • (1986) SIAM Journal of Computing , vol.15 , Issue.4 , pp. 1155-1194
    • Jouannaud, J.-P.1    Kirchner, H.2
  • 23
    • 51149098006 scopus 로고    scopus 로고
    • An E-unification algorithm for analyzing protocols that use modular exponentiation
    • LNCS 2706. Springer
    • D. Kapur, P. Narendran, and L. Wang. An E-unification algorithm for analyzing protocols that use modular exponentiation. In Proceedings of RTA '03, LNCS 2706, pp. 165-179. Springer, 2003.
    • (2003) Proceedings of RTA '03 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 24
    • 24944560619 scopus 로고    scopus 로고
    • Intruder deduction for AC-like equational theories with homomorphisms
    • LNCS 3467. Springer
    • P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for AC-like equational theories with homomorphisms. In Proceedings of RTA '05, LNCS 3467, pp. 308-322. Springer, 2005.
    • (2005) Proceedings of RTA '05 , pp. 308-322
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 25
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 26
    • 33745436010 scopus 로고    scopus 로고
    • Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
    • to appear
    • J. Meseguer and P. Thati. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Journal of Higher-Order and Symbolic Computation, to appear.
    • Journal of Higher-order and Symbolic Computation
    • Meseguer, J.1    Thati, P.2
  • 27
    • 70349714960 scopus 로고    scopus 로고
    • Symbolic protocol analysis with products and Diffie-Hellman exponentiation
    • IEEE Computer Society Press
    • J. K. Millen and V. Shmatikov. Symbolic protocol analysis with products and Diffie-Hellman exponentiation. In Proceedings of CSFW'03, pp. 47-61. IEEE Computer Society Press, 2003.
    • (2003) Proceedings of CSFW'03 , pp. 47-61
    • Millen, J.K.1    Shmatikov, V.2
  • 28
    • 0040199167 scopus 로고
    • The undecidability of the da unification problem
    • J. Siekmann and P. Szabó. The undecidability of the DA unification problem. Journal of Symbolic Computation, 54(2):402-414, 1989.
    • (1989) Journal of Symbolic Computation , vol.54 , Issue.2 , pp. 402-414
    • Siekmann, J.1    Szabó, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.