메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 139-161

Injective synchronisation: An extension of the authentication hierarchy

Author keywords

Agreement; Authentication; Injectivity; Security protocols

Indexed keywords

MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; SYNCHRONIZATION; SYNTACTICS;

EID: 33750487822     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.034     Document Type: Article
Times cited : (47)

References (31)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. and Comput. 148 1 (1999) 1-70
    • (1999) Inform. and Comput. , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 0037421015 scopus 로고    scopus 로고
    • A new logic for electronic commerce protocols
    • Adi K., Debbabi M., and Mejri M. A new logic for electronic commerce protocols. Theoret. Comput. Sci. 291 (2003) 223-283
    • (2003) Theoret. Comput. Sci. , vol.291 , pp. 223-283
    • Adi, K.1    Debbabi, M.2    Mejri, M.3
  • 3
    • 26444497860 scopus 로고    scopus 로고
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, L. Cuellar, P.H. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications. in: Proc. of CAV'2005, Lecture Notes in Computer Science, Vol. 3576, Springer, Berlin, 2005, pp. 281-285
  • 4
    • 33750468548 scopus 로고    scopus 로고
    • C. Boyd. Towards extensional goals in authentication protocols, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.
  • 6
    • 33750487698 scopus 로고    scopus 로고
    • C.J.F. Cremers, Scyther documentation, 2004 〈 http://www.win.tue.nl/~ccremers/scyther〉.
  • 7
    • 24944514681 scopus 로고    scopus 로고
    • C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T. Systä (Eds.), Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers, Lecture Notes in Computer Science, Vol. 3466, Springer, Berlin, 2005.
  • 9
    • 33750461508 scopus 로고    scopus 로고
    • FET Open Project IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003, 〈http://www.avispa-project.org/〉.
  • 10
    • 0037421091 scopus 로고    scopus 로고
    • A comparison of three authentication properties
    • Focardi R., Gorrieri R., and Martinelli F. A comparison of three authentication properties. Theoret. Comput. Sci. 291 3 (2003) 285-327
    • (2003) Theoret. Comput. Sci. , vol.291 , Issue.3 , pp. 285-327
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 11
    • 33750493809 scopus 로고    scopus 로고
    • R. Focardi, F. Martinelli, A uniform approach for the definition of security properties, in: World Congr. on Formal Methods, Vol. 1, 1999, pp. 794-813.
  • 12
    • 84937389998 scopus 로고    scopus 로고
    • T. Genet, F. Klay, Rewriting for cryptographic protocol verification, in: Conf. on Automated Deduction, Lecture Notes on Artificial Intelligence, Vol. 1831, 2000, pp. 271-290.
  • 13
    • 0029713154 scopus 로고    scopus 로고
    • D. Gollmann, What do we mean by entity authentication, in Proc. Symp. on Research in Security and Privacy, IEEE, New York, 1996, pp. 46-54.
  • 14
    • 85055795738 scopus 로고    scopus 로고
    • L. Gong, Variations on the themes of message freshness and replay-or the difficulty of devising formal methods to analyze cryptographic protocols, in: Proc. Computer Security Foundations Workshop VI, IEEE Computer Society Press, Silver Spring, MD, 1993, pp. 131-136.
  • 15
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • Guttman J.D., and Thayer F.J. Authentication tests and the structure of bundles. Theoret. Comput. Sci. 283 2 (2002) 333-380
    • (2002) Theoret. Comput. Sci. , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 16
    • 33750442057 scopus 로고    scopus 로고
    • International Organization for Standardization, Information technology-security techniques-entity authentication-Part 1: General model, ISO/IEC 9798-1, September 1991.
  • 17
    • 33750487033 scopus 로고    scopus 로고
    • ITU-TS, Recommendation Z.120: Message Sequence Chart (MSC), ITU-TS, Geneva, 1999.
  • 18
    • 33750461507 scopus 로고    scopus 로고
    • A. Jeffrey, A. Gordon, Typing one-to-one and one-to-many correspondences in security protocols. in: M. Okada, B.C. Pierce, A. Scedrov, H. Tokuda, A. Yonezawa (Eds.), Proc. of ISSS '02, Lecture Notes in Computer Science, Vol. 2514, 2002, pp. 418-434.
  • 19
    • 0013090419 scopus 로고    scopus 로고
    • S.T. Kent, Encryption-based protection for interactive user/computer communication, in: SIGCOMM'77 Proc. Fifth Symposium on Data Communications, NY, USA, 1977, ACM Press, New York, pp. 5.7-5.13.
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: T. Margaria, B. Steffen (Eds.), Proc. of TACAS '96, Lecture Notes in Computer Science, Vol. 1055, 1996, pp. 147-166.
  • 21
    • 84882791488 scopus 로고    scopus 로고
    • G. Lowe, Casper: a compiler for the analysis of security protocols, in: Proc. of CSFW '97, Rockport, IEEE, New York, 1997, pp. 18-30.
  • 22
    • 84994742813 scopus 로고    scopus 로고
    • G. Lowe, A hierarchy of authentication specifications, in: Proc. of CSFW '97, Rockport, IEEE, New York, 1997, pp. 31-44.
  • 24
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the s/key user authentication scheme
    • Mitchell C.J., and Chen L. Comments on the s/key user authentication scheme. SIGOPS Oper. Systems Rev. 30 4 (1996) 12-16
    • (1996) SIGOPS Oper. Systems Rev. , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Commun. ACM 21 (1978) 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Needham, R.1    Schroeder, M.2
  • 26
    • 0018683804 scopus 로고
    • Encryption and secure computer networks
    • Popek G.J., and Kline C.S. Encryption and secure computer networks. ACM Comput. Survey 11 4 (1979) 331-356
    • (1979) ACM Comput. Survey , vol.11 , Issue.4 , pp. 331-356
    • Popek, G.J.1    Kline, C.S.2
  • 27
    • 0029713842 scopus 로고    scopus 로고
    • A.W. Roscoe, Intensional Specifications of Security Protocols, in: Proc. of CSFW '96, IEEE, New York, 1996, pp. 28-38.
  • 29
    • 33750489970 scopus 로고    scopus 로고
    • Security protocols open repository, 〈http://www.lsv.ens-cachan.fr/spore〉.
  • 30
    • 0032678887 scopus 로고    scopus 로고
    • D. Song, Athena: a new efficient automatic checker for security protocol analysis, in: Proc. CSFW '99, Mordano, IEEE, New York, 1999, p. 192.
  • 31
    • 0031676397 scopus 로고    scopus 로고
    • F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct, in: Proc. Symp. on Security and Privacy, Oakland, IEEE, New York, 1998, pp. 160-171.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.