메뉴 건너뛰기




Volumn 2629, Issue , 2003, Pages 71-80

Analysing security protocols

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL METHODS;

EID: 33744918476     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40981-6_8     Document Type: Article
Times cited : (13)

References (30)
  • 3
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • F. Cuppens et al., editor, Computer Security - ESORICS 2000, Springer Verlag
    • Giampaolo Bella, Fabio Masacci, Lawrence C. Paulson, and Piero Tramontano. Formal verification of cardholder registration in SET. In F. Cuppens et al., editor, Computer Security - ESORICS 2000, LNCS 1895, pages 159-174. Springer Verlag, 2000.
    • (2000) LNCS , vol.1895 , pp. 159-174
    • Bella, G.1    Masacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. R. Stinson, editor, Advances in Cryptology - CRYPTO'93, Springer Verlag
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, Advances in Cryptology - CRYPTO'93, LNCS 773, pages 232-249. Springer Verlag, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 85016462400 scopus 로고
    • Systematic design of two-party authentication protocols
    • J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, Springer Verlag
    • Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of two-party authentication protocols. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, LNCS 576, pages 44-61. Springer Verlag, 1992.
    • (1992) LNCS , vol.576 , pp. 44-61
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 7
    • 0035475290 scopus 로고    scopus 로고
    • API-level attacks on embedded systems
    • October
    • Mike Bond and Ross Anderson. API-level attacks on embedded systems. IEEE Computer, 34(10):67-75, October 2001.
    • (2001) IEEE Computer , vol.34 , Issue.10 , pp. 67-75
    • Bond, M.1    Anderson, R.2
  • 10
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, Springer Verlag
    • Josef Courtois, Nicolas T. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, Advances in Cryptology - Asiacrypt 2002, LNCS 2501, pages 267-287. Springer Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 267-287
    • Courtois, J.1    Pieprzyk, N.T.2
  • 19
    • 0024665744 scopus 로고
    • Aanalyzing encryption protocols using formal verification techniques
    • May
    • Richard A. Kemmerer. Aanalyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, May 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 20
    • 84949220397 scopus 로고    scopus 로고
    • On the decorrelated fast cipher (DFC) and its theory
    • L. Knudsen, editor, Fast Software Encryption - FSE'99, Springer Verlag
    • Lars R. Knudsen and Vincent Rijmen. On the decorrelated fast cipher (DFC) and its theory. In L. Knudsen, editor, Fast Software Encryption - FSE'99, LNCS 1636, pages 81-94. Springer Verlag, 1999.
    • (1999) LNCS , vol.1636 , pp. 81-94
    • Knudsen, L.R.1    Rijmen, V.2
  • 22
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • March
    • D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Computers & Security, 11(1):75-89, March 1992.
    • (1992) Computers & Security , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 23
    • 84958752287 scopus 로고    scopus 로고
    • Towards a survivable security architecture for ad-hoc networks
    • B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, Springer Verlag
    • Silja Mäki and Tuomas Aura. Towards a survivable security architecture for ad-hoc networks. In B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, LNCS 2467, pages 63-73. Springer Verlag, 2002.
    • (2002) LNCS , vol.2467 , pp. 63-73
    • Mäki, S.1    Aura, T.2
  • 26
    • 84947242748 scopus 로고    scopus 로고
    • Keynote address: The changing environment (transcript of discussion)
    • B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, Springer Verlag
    • Roger Needham. Keynote address: The changing environment (transcript of discussion). In B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, LNCS 1796, pages 1-5. Springer Verlag, 2000.
    • (2000) LNCS , vol.1796 , pp. 1-5
    • Needham, R.1
  • 29
    • 78649840429 scopus 로고    scopus 로고
    • Provable security for block ciphers by decorrelation
    • STACS'98, Springer Verlag
    • Serge Vaudenay. Provable security for block ciphers by decorrelation. In STACS'98, LNCS 1373, pages 249-275. Springer Verlag, 1998.
    • (1998) LNCS , vol.1373 , pp. 249-275
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.