메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 162-202

A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; FORMAL LOGIC; PATTERN RECOGNITION; PUBLIC KEY CRYPTOGRAPHY; REAL TIME SYSTEMS; SECURITY OF DATA;

EID: 33750477656     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.035     Document Type: Article
Times cited : (91)

References (32)
  • 1
    • 0346205107 scopus 로고    scopus 로고
    • Unification theory
    • Robinson A., and Voronkov A. (Eds), Elsevier Science, Amsterdam (Chapter 8)
    • Baader F., and Snyder W. Unification theory. In: Robinson A., and Voronkov A. (Eds). Handbook of Automated Reasoning Vol. 1 (2001), Elsevier Science, Amsterdam 445-532 (Chapter 8)
    • (2001) Handbook of Automated Reasoning , vol.1 , pp. 445-532
    • Baader, F.1    Snyder, W.2
  • 3
    • 11944275908 scopus 로고    scopus 로고
    • Relating multiset rewriting and process algebras for security protocol analysis
    • Bistarelli S., Cervesato I., Lenzini G., and Martinelli F. Relating multiset rewriting and process algebras for security protocol analysis. J. Comput. Security 13 1 (2005) 3-47
    • (2005) J. Comput. Security , vol.13 , Issue.1 , pp. 3-47
    • Bistarelli, S.1    Cervesato, I.2    Lenzini, G.3    Martinelli, F.4
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society, Silver Spring, MD
    • Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. 14th IEEE Computer Security Foundations Workshop (2001), IEEE Computer Society, Silver Spring, MD 82-96
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 5
    • 35248865266 scopus 로고    scopus 로고
    • Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: 23rd Conf. on Foundations Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 2914, Springer, Berlin, 2003, pp. 124-135.
  • 6
    • 0041967380 scopus 로고    scopus 로고
    • Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: 18th Annu. IEEE Symp. Logic in Computer Science, 2003.
  • 8
    • 0042467908 scopus 로고    scopus 로고
    • H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or, in: 18th Annu. IEEE Symp. on Logic in Computer Science, 2003, pp. 271-280.
  • 9
    • 84858564688 scopus 로고    scopus 로고
    • N. Dershowitz, S. Mitra, G. Sivakumar, Decidable matching for convergent systems (preliminary version), in: D. Kapur (Ed.), 11th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 607, Springer, Berlin, 1992, pp. 589-602.
  • 10
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory 29 2 (1983) 198-208
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 31844452704 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL Protocol Analyzer: grammar generation
    • Küsters R., and Mitchell J. (Eds), ACM, New York
    • Escobar S., Meadows C., and Meseguer J. A rewriting-based inference system for the NRL Protocol Analyzer: grammar generation. In: Küsters R., and Mitchell J. (Eds). Proc. 2005 ACM Workshop on Formal Methods in Security Engineering (2005), ACM, New York 1-12
    • (2005) Proc. 2005 ACM Workshop on Formal Methods in Security Engineering , pp. 1-12
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 13
    • 84937389998 scopus 로고    scopus 로고
    • T. Genet, F. Klay, Rewriting for cryptographic protocol verification, in: D.A. McAllester (Ed.), 17th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 1831, Springer, Berlin, 2000, pp. 271-290.
  • 14
    • 14844344837 scopus 로고    scopus 로고
    • A decision procedure for the existence of a rank function
    • Heather J., and Schneider S. A decision procedure for the existence of a rank function. J. Comput. Security 13 2 (2005) 317-344
    • (2005) J. Comput. Security , vol.13 , Issue.2 , pp. 317-344
    • Heather, J.1    Schneider, S.2
  • 15
    • 85035020357 scopus 로고    scopus 로고
    • J. Hullot, Canonical forms and unification, in: W. Bibel, R. Kowalski (Eds.), Fifth Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 87, Springer, Berlin, 1980, pp. 318-334.
  • 16
    • 33750431255 scopus 로고
    • Matching, Unification and Complexity
    • Kapur D., and Narendran P. Matching, Unification and Complexity. ACM SIGSAM Bulletin 21 4 (1987) 6-9
    • (1987) ACM SIGSAM Bulletin , vol.21 , Issue.4 , pp. 6-9
    • Kapur, D.1    Narendran, P.2
  • 17
    • 0342658605 scopus 로고    scopus 로고
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for Construction and Analysis of Systems, Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
  • 18
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Meadows C. Applying formal methods to the analysis of a key management protocol. J. Comput. Security 1 1 (1992)
    • (1992) J. Comput. Security , vol.1 , Issue.1
    • Meadows, C.1
  • 19
    • 84949740740 scopus 로고    scopus 로고
    • C. Meadows, Analyzing the Needham-Schroeder public-key protocol: a comparison of two approaches, in: E. Bertino, H. Kurth, G. Martella, E. Montolivo (Eds.), Proc. Fourth European Symp. on Research in Computer Security, Lecture Notes in Computer Science, Vol. 1146, Springer, Berlin, 1996, pp. 351-364.
  • 20
    • 0029700221 scopus 로고    scopus 로고
    • Language generation and verification in the NRL Protocol Analyzer
    • IEEE Computer Society Press, Silver Spring, MD
    • Meadows C. Language generation and verification in the NRL Protocol Analyzer. Proc. Ninth IEEE Computer Security Foundations Workshop (1996), IEEE Computer Society Press, Silver Spring, MD 48-61
    • (1996) Proc. Ninth IEEE Computer Security Foundations Workshop , pp. 48-61
    • Meadows, C.1
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: an overview
    • Meadows C. The NRL Protocol Analyzer: an overview. J. Logic Programming 26 2 (1996) 113-131
    • (1996) J. Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 22
    • 0033682446 scopus 로고    scopus 로고
    • Invariant generation techniques in cryptographic protocol analysis
    • IEEE Computer Society Press, Silver Spring, MD
    • Meadows C. Invariant generation techniques in cryptographic protocol analysis. Proc. 13th Computer Security Foundations Workshop (2000), IEEE Computer Society Press, Silver Spring, MD
    • (2000) Proc. 13th Computer Security Foundations Workshop
    • Meadows, C.1
  • 23
    • 27844540827 scopus 로고    scopus 로고
    • Specification of the group domain of interpretation protocol using NPATRL and the NRL Protocol Analyzer
    • Meadows C., Cervesato I., and Syverson P. Specification of the group domain of interpretation protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Security 12 6 (2004) 893-932
    • (2004) J. Comput. Security , vol.12 , Issue.6 , pp. 893-932
    • Meadows, C.1    Cervesato, I.2    Syverson, P.3
  • 24
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • Meseguer J. Conditional rewriting logic as a unified model of concurrency. Theoret. Comput. Sci. 96 1 (1992) 73-155
    • (1992) Theoret. Comput. Sci. , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 25
    • 84957873927 scopus 로고    scopus 로고
    • J. Meseguer, Membership algebra as a logical framework for equational specification, in: F. Parisi-Presicce (Ed.), Proc. WADT'97, Springer, Lecture Notes in Computer Science, Vol. 1376, Springer, Berlin, 1998, pp. 18-61.
  • 26
    • 31844437900 scopus 로고    scopus 로고
    • Symbolic reachability analysis using narrowing and its application to the verification of cryptographic protocols
    • Martí-Oliet J. (Ed), ENTCS, Elsevier, Amsterdam
    • Meseguer J., and Thati P. Symbolic reachability analysis using narrowing and its application to the verification of cryptographic protocols. In: Martí-Oliet J. (Ed). Proc. Fifth Internat. Workshop on Rewriting Logic and its Applications (2004), ENTCS, Elsevier, Amsterdam
    • (2004) Proc. Fifth Internat. Workshop on Rewriting Logic and its Applications
    • Meseguer, J.1    Thati, P.2
  • 27
    • 0035751921 scopus 로고    scopus 로고
    • J. Millen, V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, in: Eighth ACM Conf. on Computer and Communications Security, 2001, pp. 166-175.
  • 28
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Comm. ACM 21 12 (1978) 993-999
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 29
    • 84863913545 scopus 로고    scopus 로고
    • D. Peled, Ten years of partial order reduction, in: 10th Conf. on Computer-aided Verification, Lecture Notes in Computer Science, Vol. 1427, Springer, Berlin, 1998, pp. 17-28.
  • 30
    • 0033741481 scopus 로고    scopus 로고
    • Formal characterization and automated analysis of known-pair and chosen-text attacks
    • Stubblebine S., and Meadows C. Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE J. Selected Areas in Comm. 18 4 (2000) 571-581
    • (2000) IEEE J. Selected Areas in Comm. , vol.18 , Issue.4 , pp. 571-581
    • Stubblebine, S.1    Meadows, C.2
  • 31
    • 33750453977 scopus 로고    scopus 로고
    • TeReSe (Ed.), Term Rewriting Systems, Cambridge University Press, Cambridge, 2003.
  • 32
    • 84957640213 scopus 로고    scopus 로고
    • C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: H. Ganzinger (Ed.), 16th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 1632, Springer, Berlin, 1999, pp. 314-328.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.