메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 41-54

Formal analysis of a fair payment protocol

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; COMMUNICATION CHANNELS (INFORMATION THEORY); MODEL CHECKING; TEMPORAL LOGIC;

EID: 33646587422     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_4     Document Type: Conference Paper
Times cited : (2)

References (16)
  • 1
    • 0004226674 scopus 로고    scopus 로고
    • PhD thesis. University of Waterloo. [Asokan, 1998]
    • [Asokan, 1998] Asokan, N. (1998). Fairness in electronic commerce. PhD thesis. University of Waterloo.
    • (1998) Fairness in electronic commerce
    • Asokan, N.1
  • 4
    • 84902522264 scopus 로고    scopus 로고
    • Technical Report SEN-R0410, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands. [Cederquist and Dashti, 2004]
    • [Cederquist and Dashti, 2004] Cederquist, J. and Dashti, M. (2004). Formal analysis of a fair payment protocol. Technical Report SEN-R0410, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands.
    • (2004) Formal analysis of a fair payment protocol
    • Cederquist, J.1    Dashti, M.2
  • 5
    • 20144373491 scopus 로고    scopus 로고
    • The Dolev-Yao Intruder is the Most Powerful Attacker
    • In Halpern, J., editor, Boston, MA. IEEE Computer Society Press. [Cervesato, 2001]
    • [Cervesato, 2001] Cervesato, I. (2001). The Dolev-Yao Intruder is the Most Powerful Attacker. In Halpern, J., editor, 16th Annual Symposium on Logic in Computer Science-LICS'01, Boston, MA. IEEE Computer Society Press.
    • (2001) 16th Annual Symposium on Logic in Computer Science-LICS'01
    • Cervesato, I.1
  • 6
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [Dolev and Yao, 1983]
    • [Dolev and Yao, 1983] Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 8
    • 0001879305 scopus 로고
    • The syntax and semantics of μCRL
    • In Ponse, A., Verhoef, C., and van Vlijmen, S. F. M., editors, Workshops in Computing Series, Springer-Verlag. [Groote and Ponse, 1995]
    • [Groote and Ponse, 1995] Groote, J. and Ponse, A. (1995). The syntax and semantics of μCRL. In Ponse, A., Verhoef, C., and van Vlijmen, S. F. M., editors, Algebra of Communicating Processes '94, Workshops in Computing Series, pages 26-62. Springer-Verlag.
    • (1995) Algebra of Communicating Processes '94 , pp. 26-62
    • Groote, J.1    Ponse, A.2
  • 9
    • 84944080333 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • In Larsen, K. and Nielsen, M., editors, Springer-Verlag. [Kremer and Raskin, 2001]
    • [Kremer and Raskin, 2001] Kremer, S. and Raskin, J. (2001). A game-based verification of non-repudiation and fair exchange protocols. In Larsen, K. and Nielsen, M., editors, Proceedings of the 12th International Conference on Concurrency Theory, volume 2154 of LNCS, pages 551-565. Springer-Verlag.
    • (2001) Proceedings of the 12th International Conference on Concurrency Theory, volume 2154 of LNCS , pp. 551-565
    • Kremer, S.1    Raskin, J.2
  • 11
    • 0003960505 scopus 로고    scopus 로고
    • Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology. [Pagnia and Gartner, 1999]
    • [Pagnia and Gartner, 1999] Pagnia, H. and Gartner, F. C. (1999). On the impossibility of fair exchange without a trused third party. Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology.
    • (1999) On the impossibility of fair exchange without a trused third party
    • Pagnia, H.1    Gartner, F.C.2
  • 12
    • 0037244617 scopus 로고    scopus 로고
    • Fair exchange
    • [Pagnia et al., 2003]
    • [Pagnia et al., 2003] Pagnia, H., Vogt, H., and Gartner, F. C. (2003). Fair exchange. The Computer Journal, 46(1):55-7.
    • (2003) The Computer Journal , vol.46 , Issue.1 , pp. 55-57
    • Pagnia, H.1    Vogt, H.2    Gartner, F.C.3
  • 13
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • In, IEEE Computer Society Press. [Schneider, 1998]
    • [Schneider, 1998] Schneider, S. (1998). Formal analysis of a non-repudiation protocol. In Proceedings of The 11th Computer Security Foundations Workshop, pages 54-65. IEEE Computer Society Press.
    • (1998) Proceedings of The 11th Computer Security Foundations Workshop , pp. 54-65
    • Schneider, S.1
  • 14
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • [Shmatikov and Mitchell, 2002]
    • [Shmatikov and Mitchell, 2002] Shmatikov, V. and Mitchell, J. C. (2002). Finite-state analysis of two contract signing protocols. Theoretical Computer Sciene, 283(2):419-450.
    • (2002) Theoretical Computer Sciene , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.