메뉴 건너뛰기




Volumn 3995 LNCS, Issue , 2006, Pages 115-129

Developing provable secure M-commerce applications

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; CODES (SYMBOLS); COMMERCE; JAVA PROGRAMMING LANGUAGE; NETWORK PROTOCOLS; TICKET ISSUING MACHINES;

EID: 33746654922     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11766155_9     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 4
    • 84941161567 scopus 로고    scopus 로고
    • [Bee] [last seen 2006-03-16]
    • [Bee] Tickets on your Mobile. URL: http://www.beep.nl [last seen 2006-03-16].
    • Tickets on Your Mobile
  • 6
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • [BMV03] LNCS 2808. Springer-Verlag, Heidelberg
    • [BMV03] David Basin, Sebastian Mödersheim, and Luca Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Proceedings of Esorics'03, LNCS 2808, pages 253-270. Springer-Verlag, Heidelberg, 2003.
    • (2003) Proceedings of Esorics'03 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 7
    • 0842305097 scopus 로고    scopus 로고
    • The ASM refinement method
    • [Bör03] November
    • [Bör03] E. Börger. The ASM Refinement Method. Formal Aspects of Computing, 15 (1-2): 237-257, November 2003.
    • (2003) Formal Aspects of Computing , vol.15 , Issue.1-2 , pp. 237-257
    • Börger, E.1
  • 11
    • 0003940516 scopus 로고    scopus 로고
    • [dRE98] Data Refinement: Model-Oriented Proof Methods and their Comparison. Cambridge University Press
    • [dRE98] W. de Roever and K. Engelhardt. Data Refinement: Model-Oriented Proof Methods and their Comparison, volume 47 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 1998.
    • (1998) Cambridge Tracts in Theoretical Computer Science , vol.47
    • De Roever, W.1    Engelhardt, K.2
  • 14
    • 0002017107 scopus 로고
    • Evolving algebras 1993: Lipari guide
    • [Gur95] E. Börger, editor. Oxford University Press
    • [Gur95] M. Gurevich. Evolving algebras 1993: Lipari guide. In E. Börger, editor, Specification and Validation Methods, pages 9-36. Oxford University Press, 1995.
    • (1995) Specification and Validation Methods , pp. 9-36
    • Gurevich, M.1
  • 15
    • 33746611324 scopus 로고    scopus 로고
    • Verifying security protocols: An ASM approach
    • [HGRS05] D. Beauquier, E. Börger, and A. Slissenko, editors. University Paris 12 ∼ Val de Marne, Créteil, France, March
    • [HGRS05] D. Haneberg, H. Grandy, W. Reif, and G. Schellhorn. Verifying Security Protocols: An ASM Approach. In D. Beauquier, E. Börger, and A. Slissenko, editors, 12th Int. Workshop on Abstract State Machines, ASM 05. University Paris 12 ∼ Val de Marne, Créteil, France, March 2005.
    • (2005) 12th Int. Workshop on Abstract State Machines, ASM 05
    • Haneberg, D.1    Grandy, H.2    Reif, W.3    Schellhorn, G.4
  • 16
    • 85034864446 scopus 로고
    • Data refinement refined
    • [HHS86] B. Robinet and R. Wilhelm, editors, Proc. ESOP 86. Springer-Verlag
    • [HHS86] He Jifeng, C. A. R. Hoare, and J. W. Sanders. Data refinement refined. In B. Robinet and R. Wilhelm, editors, Proc. ESOP 86, volume 213 of Lecture. Notes in Computer Science, pages 187-196. Springer-Verlag, 1986.
    • (1986) Lecture. Notes in Computer Science , vol.213 , pp. 187-196
    • Jifeng, H.1    Hoare, C.A.R.2    Sanders, J.W.3
  • 19
    • 84941159932 scopus 로고    scopus 로고
    • [KIV]
    • [KIV] Web presentation of KIV projects. URL: http://www.informatik.uni-augsburg.de/swt/projects/.
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • [Low96]. Springer-Verlag
    • [Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • [Mea96]
    • [Mea96] Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 22
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • [Pau98]
    • [Pau98] Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 23
    • 0842296524 scopus 로고    scopus 로고
    • Verification of ASM refinements using generalized forward simulation
    • [Sch01]
    • [Sch01] G. Schellhorn. Verification of ASM Refinements Using Generalized Forward Simulation. Journal of Universal Computer Science (J.UCS), 7(11):952-979, 2001. URL: http://hyperg.iicm.tu-graz.ac.at/jucs/.
    • (2001) Journal of Universal Computer Science (J.UCS) , vol.7 , Issue.11 , pp. 952-979
    • Schellhorn, G.1
  • 24
    • 18144362508 scopus 로고    scopus 로고
    • ASM refinement and generalizations of forward simulation in data refinement: A comparison
    • [Sch05] May
    • [Sch05] G. Schellhorn. ASM Refinement and Generalizations of Forward Simulation in Data Refinement: A Comparison. Journal of Theoretical Computer Science, vol. 336, no. 2-3:403-435, May 2005.
    • (2005) Journal of Theoretical Computer Science , vol.336 , Issue.2-3 , pp. 403-435
    • Schellhorn, G.1
  • 25
    • 33746637741 scopus 로고    scopus 로고
    • A formally verified calculus for full Java Card
    • [Ste04] C. Rattray, S. Maharaj, and C. Shankland, editors Stirling Scotland, July. Springer LNCS 3116
    • [Ste04] K. Stenzel. A formally verified calculus for full Java Card. In C. Rattray, S. Maharaj, and C. Shankland, editors, Algebraic Methodology and Software Technology (AMAST) 2004, Proceedings, Stirling Scotland, July 2004. Springer LNCS 3116.
    • (2004) Algebraic Methodology and Software Technology (AMAST) 2004, Proceedings
    • Stenzel, K.1
  • 26
    • 23844503590 scopus 로고    scopus 로고
    • [Ste05]. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik
    • [Ste05] Kurt Stenzel. Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, 2005.
    • (2005) Verification of Java Card Programs
    • Stenzel, K.1
  • 27
    • 84941152937 scopus 로고    scopus 로고
    • [Sun] Java Micro Edition
    • [Sun] Sun Microsystems Inc. Java Micro Edition. URL: http://java.sun.com/j2me/index.jsp.
  • 29
    • 84946432389 scopus 로고    scopus 로고
    • Analysis of the SSL 3.0 protocol
    • November. A revised version is available
    • [WS96] David Wagner and Bruce Schneier. Analysis of the SSL 3.0 protocol. In 2nd USENIX Workshop on Electronic Commerce, November 1996. A revised version is available at http://www.schneier.com/paper-ssl.html.
    • (1996) 2nd USENIX Workshop on Electronic Commerce
    • Wagner, D.1    Schneier, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.