메뉴 건너뛰기




Volumn 4, Issue 4, 2006, Pages 84-87

Applying protocol analysis to security device interfaces

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC TELLER MACHINES; COMPUTER CRIME; CRYPTOGRAPHY; IDENTIFICATION (CONTROL SYSTEMS); INTERFACES (COMPUTER); NETWORK PROTOCOLS; PROBLEM SOLVING;

EID: 33747255010     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2006.85     Document Type: Review
Times cited : (17)

References (13)
  • 1
    • 3042782044 scopus 로고    scopus 로고
    • Fairy dust, secrets, and the real world
    • S.W. Smith, "Fairy Dust, Secrets, and the Real World," IEEE Security & Privacy, vol. 1, no. 1., 2003, pp. 89-93.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 89-93
    • Smith, S.W.1
  • 3
    • 33244490325 scopus 로고
    • Common cryptographic architecture cryptographic application programming interface
    • D.B. Johnson et al., "Common Cryptographic Architecture Cryptographic Application Programming Interface," IBM Systems J., vol. 30, no. 2, 1991, p. 130; www.research.ibm.com/journal/sj/302/ibmsj3002C.pdf.
    • (1991) IBM Systems J. , vol.30 , Issue.2 , pp. 130
    • Johnson, D.B.1
  • 5
    • 34547205365 scopus 로고    scopus 로고
    • Trusted Computing Group, Oct.
    • TPM v 1.2 Specification Changes, Trusted Computing Group, Oct. 2003; www.trustedcomputing-group.org/groups/tpm/TPM_1_2_Changes_final.pdf.
    • (2003) TPM v 1.2 Specification Changes
  • 6
    • 14044268737 scopus 로고    scopus 로고
    • PhD thesis, Univ. of Cambridge Computer Lab., June
    • M. Bond, Understanding Security APIs, PhD thesis, Univ. of Cambridge Computer Lab., June 2004.
    • (2004) Understanding Security APIs
    • Bond, M.1
  • 13
    • 14044274228 scopus 로고    scopus 로고
    • Extending security protocol analysis: New challenges
    • M. Bond and Jolyon Clulow, "Extending Security Protocol Analysis: New Challenges," Electronic Notes in Theoretical Computer Science., vol. 125, no. 1, 2005, pp. 13-24.
    • (2005) Electronic Notes in Theoretical Computer Science , vol.125 , Issue.1 , pp. 13-24
    • Bond, M.1    Clulow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.