메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 287-294

Feasibility of multi-protocol attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; NETWORK PROTOCOLS;

EID: 33750936222     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.63     Document Type: Conference Paper
Times cited : (36)

References (28)
  • 3
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, June. IEEE Computer Society
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, June 2001. IEEE Computer Society.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 4
    • 33645603568 scopus 로고    scopus 로고
    • Protocols for authentication and key establishment
    • Springer. ISBN: 3-540-43107-1
    • C. Boyd and A. Mathuria. Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, 2003. ISBN: 3-540-43107-1.
    • (2003) Information Security and Cryptography
    • Boyd, C.1    Mathuria, A.2
  • 5
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Report 2000/067
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067.
    • Cryptology EPrint Archive
    • Canetti, R.1
  • 10
    • 24944514681 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • S. Leue and T. Systä, editors, Scenarios: Models, Transformations and Tools Workshop 2003, Revised Selected Papers. Springer
    • C. Cremers and S. Mauw. Operational semantics of security protocols. In S. Leue and T. Systä, editors, Scenarios: Models, Transformations and Tools Workshop 2003, Revised Selected Papers, volume 3466 of LNCS. Springer, 2005.
    • (2005) LNCS , vol.3466
    • Cremers, C.1    Mauw, S.2
  • 11
    • 33750960535 scopus 로고    scopus 로고
    • Defining authentication in a trace model
    • T. Dimitrakos and F. Martinelli, editors, FAST 2003, Pisa, September
    • C. Cremers, S. Mauw, and E. de Vink. Defining authentication in a trace model. In T. Dimitrakos and F. Martinelli, editors, FAST 2003, pages 131-145, Pisa, September 2003. IITT-CNR technical report.
    • (2003) IITT-CNR Technical Report , pp. 131-145
    • Cremers, C.1    Mauw, S.2    De Vink, E.3
  • 12
    • 2642548302 scopus 로고    scopus 로고
    • Secure protocol composition
    • Proc. of Mathematical Foundations of Programming Semantics
    • A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition. In Proc. of Mathematical Foundations of Programming Semantics, volume 83 of ENTCS, 2003.
    • (2003) ENTCS , vol.83
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 16
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2):217-244, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 19
    • 12744277366 scopus 로고    scopus 로고
    • On preventing type flaw attacks on security protocols with a simplified tagging scheme
    • Y. Li, W. Yang, and C.-W. Huang. On preventing type flaw attacks on security protocols with a simplified tagging scheme. J. Inf. Sci. Eng., 21(1):59-84, 2005.
    • (2005) J. Inf. Sci. Eng. , vol.21 , Issue.1 , pp. 59-84
    • Li, Y.1    Yang, W.2    Huang, C.-W.3
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, volume 1055, pages 147-166. Springer Verlag, 1996.
    • (1996) Proceedings of TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE
    • G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc. CSFW '97, Rockport. IEEE, 1997.
    • (1997) Proc. CSFW '97, Rockport
    • Lowe, G.1
  • 23
    • 33750963837 scopus 로고    scopus 로고
    • Tags for multi-protocol authentication
    • Electronic Notes in Theoretical Computer Science, August. To appear
    • M. Maffei. Tags for multi-protocol authentication. In Proc. SECCO 2004, Electronic Notes in Theoretical Computer Science, August 2004. To appear.
    • (2004) Proc. SECCO 2004
    • Maffei, M.1
  • 24
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 25
    • 33750937443 scopus 로고    scopus 로고
    • Security protocols open repository (SPORE)
    • Security protocols open repository (SPORE).
  • 27
    • 0033605501 scopus 로고    scopus 로고
    • Inter-protocol interleaving attacks on some authentication and key distribution protocols
    • W. Tzeng and C. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Inf. Process. Lett., 69(6):297-302, 1999.
    • (1999) Inf. Process. Lett. , vol.69 , Issue.6 , pp. 297-302
    • Tzeng, W.1    Hu, C.2
  • 28
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T. Woo and S. Lam. A lesson on authentication protocol design. SIGOPS Oper. Syst. Rev., 28(3):24-37, 1994.
    • (1994) SIGOPS Oper. Syst. Rev. , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.