메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 33-56

Compositional analysis of contract-signing protocols

Author keywords

Contract signing; Logic; Security protocols

Indexed keywords

COMPUTER SCIENCE; FORMAL LOGIC; SECURITY OF DATA;

EID: 33750447642     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.039     Document Type: Article
Times cited : (15)

References (25)
  • 1
    • 33750434740 scopus 로고    scopus 로고
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, Technical Report RZ 2976, IBM Research, 1997.
  • 2
    • 0031650188 scopus 로고    scopus 로고
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proc. IEEE Symp. on Research in Security and Privacy, IEEE, New York, 1998, pp. 86-99.
  • 3
    • 0035751922 scopus 로고    scopus 로고
    • R. Chadha, M. Kanovich, A. Scedrov, Inductive methods and contract-signing protocols, in: Eighth ACM Conf. on Computer and Communications Security, ACM Press, New York, 2001, pp. 176-185.
  • 4
    • 4944247375 scopus 로고    scopus 로고
    • R. Chadha, S. Kremer, A. Scedrov, Formal analysis of multi-party contract signing, in: Proc. 17th IEEE Computer Security Foundations Workshop, IEEE, New York, 2004, pp. 266-279.
  • 5
    • 35248877959 scopus 로고    scopus 로고
    • R. Chadha, J.C. Mitchell, A. Scedrov, V. Shmatikov, Contract signing, optimism, and advantage, in: 14th International Conference on Concurrency Theory (CONCUR '03), Lecture Notes in Computer Science, Vol. 2761, Springer, Berlin, 2003.
  • 6
    • 24144442872 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, A derivation system and compositional logic for security protocols, J. Comput. Security 13 (3) (2005) 423-482.
  • 7
    • 34548864135 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, A derivation system for security protocols and its logical formalization, in: Proc. 16th IEEE Computer Security Foundations Workshop, IEEE, New York, 2003, pp. 109-125.
  • 8
    • 2642548302 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition (Extended abstract), in: Proc. of ACM Workshop on Formal Methods in Security Engineering, 2003, pp. 11-23.
  • 9
    • 4944226639 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Abstraction and refinement in protocol derivation, in: Proc. 17th IEEE Computer Security Foundations Workshop, IEEE, New York, 2004, pp. 30-45.
  • 10
    • 33750448523 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: Proc. 19th Annu. Conf. on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, Vol. 83, 2004.
  • 11
    • 26444565771 scopus 로고    scopus 로고
    • A. Datta, A. Derek, J.C. Mitchell, V. Shmatikov, M. Turuani, Probabilistic polynomial-time semantics for a protocol security logic, in: Proc. 32nd Internat. Colloq. on Automata, Languages and Programming (ICALP '05), Lecture Notes in Computer Science, Springer, Berlin, 2005.
  • 12
    • 0034834930 scopus 로고    scopus 로고
    • N. Durgin, J.C. Mitchell, D. Pavlovic, A compositional logic for protocol correctness, in: Proc. 14th IEEE Computer Security Foundations Workshop, IEEE, New York, 2001, pp. 241-255.
  • 13
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. J. Comput. Security 11 (2003) 677-721
    • (2003) J. Comput. Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 14
    • 33750482466 scopus 로고    scopus 로고
    • S. Even, Y. Yacobi, Relations among public key signature schemes, Technical Report 175, Computer Science Department, Technion, Israel, 1980.
  • 15
    • 84957060126 scopus 로고    scopus 로고
    • J.A. Garay, M. Jakobsson, P. MacKenzie, Abuse-free optimistic contract signing, in: Proc. 19th Annu. Internat. Cryptology Conf. on Advances in Cryptology, Springer, Berlin, 1999, pp. 449-466.
  • 16
    • 33745770376 scopus 로고    scopus 로고
    • C. He, M. Sundararajan, A. Datta, A. Derek, J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS. in: CCS '05: Proc. 12th ACM Conf. on Computer and Communications Security, 2005.
  • 17
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of non-repudiation protocols
    • Kremer S., Markowitch O., and Zhou J. An intensive survey of non-repudiation protocols. Comput. Commun. 25 17 (2002) 1606-1621
    • (2002) Comput. Commun. , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 18
    • 84948779843 scopus 로고    scopus 로고
    • S. Kremer, J.-F. Raskin, Game analysis of abuse-free contract signing, in: Proc. 15th IEEE Computer Security Foundations Workshop, IEEE, New York, 2002, pp. 206-220.
  • 20
    • 84959047912 scopus 로고    scopus 로고
    • O. Markowitch, S. Kremer, A multi-party optimistic non-repudiation protocol, in: Proc. Third Internat. Conf. on Information Security and Cryptology, Springer, Berlin, 2001, pp. 109-122.
  • 21
    • 84949206560 scopus 로고    scopus 로고
    • O. Markowitch, S. Saeednia, Optimistic fair exchange with transparent signature recovery, in: Proc. Fifth Internat. Conf. on Financial Cryptography, Springer, Berlin, 2001, pp. 339-350.
  • 22
    • 33750462245 scopus 로고    scopus 로고
    • H. Pagnia, F.C. Gärtner, On the impossibility of fair exchange without a trusted third party, Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology, Darmstadt, Germany, 1999.
  • 23
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Shmatikov V., and Mitchell J.C. Finite-state analysis of two contract signing protocols. Theoret. Comput. Sci. 283 2 (2002) 419-450
    • (2002) Theoret. Comput. Sci. , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 24
    • 34547265412 scopus 로고    scopus 로고
    • H. Vogt, Asynchronous optimistic fair exchange based on revocable items, in: Proc. Seventh Internat. Conf. on Financial Cryptography, Springer, Berlin, 2003, pp. 208-222.
  • 25
    • 84961312272 scopus 로고    scopus 로고
    • J. Zhou, R. Deng, F. Bao, Evolution of fair non-repudiation with TTP, in: Proc. Fourth Australasian Conf. on Information Security and Privacy, Lecture Notes in Computer Science, Vol. 1587, Springer, Berlin, 1999, pp. 258-269.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.