메뉴 건너뛰기




Volumn 36, Issue 1-2, 2006, Pages 5-37

Verifying the SET purchase protocols

Author keywords

Deductive verification; Electronic commerce; Inductive definitions; Isabelle; Security protocols

Indexed keywords

AGREEMENT PROPERTIES; AUTHENTICITY; CARDHOLDERS; PAYMENT TRANSACTION;

EID: 33750247207     PISSN: 01687433     EISSN: 15730670     Source Type: Journal    
DOI: 10.1007/s10817-005-9018-6     Document Type: Article
Times cited : (46)

References (34)
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • January
    • Abadi, M. and Needham, R. M.: Prudent engineering practice for cryptographic protocols, IEEE Trans. Softw. Eng. 22(1) (January 1996), 6-15.
    • (1996) IEEE Trans. Softw. Eng. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.M.2
  • 3
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • E. Snekkenes and D. Gollmann (eds.), Proc. 8th Eur. Symp. on Res. in Comp. Sec., Springer
    • Basin, D., Mödersheim, S. and Viganò, L.: An on-the-fly model-checker for security protocol analysis, in E. Snekkenes and D. Gollmann (eds.), Proc. 8th Eur. Symp. on Res. in Comp. Sec., Volume 2000 of Lecture Notes in Comp. Sci., Springer, 2003, pp. 253-270.
    • (2003) Lecture Notes in Comp. Sci. , vol.2000 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 4
    • 0037237984 scopus 로고    scopus 로고
    • Inductive verification of smart card protocols
    • Bella, G.: Inductive verification of smart card protocols, J. Comput. Secur. 11(1) (2003), 87-132.
    • (2003) J. Comput. Secur. , vol.11 , Issue.1 , pp. 87-132
    • Bella, G.1
  • 5
    • 0038011251 scopus 로고    scopus 로고
    • The verification of an industrial payment protocol: The SET purchase phase
    • V. Atluri (ed.), ACM
    • Bella, G., Massacci, F. and Paulson, L. C.: The verification of an industrial payment protocol: The SET purchase phase, in V. Atluri (ed.), 9th ACM Conf. on Comp. and Comm. Sec., ACM, 2002, pp. 12-20.
    • (2002) 9th ACM Conf. on Comp. and Comm. Sec. , pp. 12-20
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 7
    • 14844323149 scopus 로고    scopus 로고
    • An overview of the verification of SET
    • Bella, G., Massacci, F. and Paulson, L. C.: An overview of the verification of SET, Int. J. Inf. Secur. 4(1-2) (2005), 17-28.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.1-2 , pp. 17-28
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 8
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • F. Cuppens, Y. Deswarte, D. Gollman and M. Waidner (eds.), Computer Security - ESORICS 2000, Springer
    • Bella, G., Massacci, F., Paulson, L. C. and Tramontano, P.: Formal verification of cardholder registration in SET, in F. Cuppens, Y. Deswarte, D. Gollman and M. Waidner (eds.), Computer Security - ESORICS 2000, volume 1895 of Lecture Notes in Comp. Sci., Springer, 2000, pp. 159-174.
    • (2000) Lecture Notes in Comp. Sci. , vol.1895 , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 11
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • Durgin, N., Mitchell, J. and Pavlovic, D.: A compositional logic for proving security properties of protocols, J. Comput. Secur. 11(4) (2004), 677-721.
    • (2004) J. Comput. Secur. , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 12
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • Fábrega, F. J. T., Herzog, J. C. and Guttman, J. D.: Strand spaces: Proving security protocols correct, J. Comp. Secur. 7 (1999), 191-220.
    • (1999) J. Comp. Secur. , vol.7 , pp. 191-220
    • Fábrega, F.J.T.1    Herzog, J.C.2    Guttman, J.D.3
  • 13
    • 0029713154 scopus 로고    scopus 로고
    • What do we mean by entity authentication?
    • IEEE Comp. Society Press
    • Gollmann, D.: What do we mean by entity authentication? in Proc. 15th IEEE Symp. on Security and Privacy, IEEE Comp. Society Press, 1996, pp. 46-54.
    • (1996) Proc. 15th IEEE Symp. on Security and Privacy , pp. 46-54
    • Gollmann, D.1
  • 15
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design - Tutorial Lectures, Springer
    • Guttman, J.: Security goals: Packet trajectories and strand spaces, in R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design - Tutorial Lectures, volume 2171 of Lecture Notes in Comp. Sci., Springer, 2001, pp. 197-261.
    • (2001) Lecture Notes in Comp. Sci. , vol.2171 , pp. 197-261
    • Guttman, J.1
  • 17
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Comp. Society Press
    • Löwe, G.: A hierarchy of authentication specifications, in Proc. 10th IEEE Comp. Sec. Found. Workshop, IEEE Comp. Society Press, 1997, pp. 31-43.
    • (1997) Proc. 10th IEEE Comp. Sec. Found. Workshop , pp. 31-43
    • Löwe, G.1
  • 18
    • 0035067667 scopus 로고    scopus 로고
    • Fault-preserving simplifying transformations for security protocols
    • Lowe, G. and Hui, M. L.: Fault-preserving simplifying transformations for security protocols, J. Comput. Secur. 9 (2001), 3-46.
    • (2001) J. Comput. Secur. , vol.9 , pp. 3-46
    • Lowe, G.1    Hui, M.L.2
  • 23
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet key exchange protocol using the NRE protocol analyzer
    • IEEE Comp. Society Press
    • Meadows, C.: Analysis of the Internet Key Exchange protocol using the NRE Protocol Analyzer, in SSP-99, IEEE Comp. Society Press, 1999, pp. 216-231.
    • (1999) SSP-99 , pp. 216-231
    • Meadows, C.1
  • 24
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1) (2003), 44-54.
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 25
    • 84958035071 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • R. Hirschfeld, (ed.), Proc. Financial Cryptography 98, Springer
    • Meadows, C. and Syverson, P.: A formal specification of requirements for payment transactions in the SET protocol, in R. Hirschfeld, (ed.), Proc. Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer, 1998.
    • (1998) Lecture Notes in Comp. Sci. , vol.1465
    • Meadows, C.1    Syverson, P.2
  • 29
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L. C.: The inductive approach to verifying cryptographic protocols, J. Comput. Secur. 6 (1998), 85-128.
    • (1998) J. Comput. Secur. , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 30
    • 0013087577 scopus 로고    scopus 로고
    • A generic tableau prover and its integration with Isabelle
    • Paulson, L. C.: A generic tableau prover and its integration with Isabelle, J. Univers. Comput. Sci. 5(3) (1999), 73-87.
    • (1999) J. Univers. Comput. Sci. , vol.5 , Issue.3 , pp. 73-87
    • Paulson, L.C.1
  • 31
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • Paulson, L. C.: Inductive analysis of the internet protocol TLS, ACM Trans. Inf. Syst. Secur. 2(3) (1999), 332-351.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 32
    • 33750237967 scopus 로고    scopus 로고
    • Quisquater, J.-J., Deswarte, Y., Meadows, C. and Gollmann, D. (eds.), Computer Security - ESORICS 98, Springer
    • Quisquater, J.-J., Deswarte, Y., Meadows, C. and Gollmann, D. (eds.), Computer Security - ESORICS 98, volume 1485 of Lecture Notes in Comp. Sci. Springer, 1998.
    • (1998) Lecture Notes in Comp. Sci. , vol.1485


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.