메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 303-308

A comparative study of security protocols validation tools: HERMES vs. AVISPA

Author keywords

AVISPA; EVA; Formal validation; Hermes; HLPSL; Security protocols

Indexed keywords

COMPUTER ARCHITECTURE; INTERNET; ONLINE SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33750948386     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icact.2006.205974     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 1
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • May
    • Stefanos Gritzalis, Diomidis Spinellis, and Panagiotis Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis,design, and verification. Computer Communications, 22(8):695-707,May 1999
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 695-707
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 4
    • 33744984154 scopus 로고    scopus 로고
    • Hermes,a tool verifying secrecy properties of unbounded security protocols
    • Lecture Notes in Computer Science, Springer Verlag, July
    • Liana Bozga, Yassine Lakhnech and Michael Périn. Hermes,a tool verifying secrecy properties of unbounded security protocols. In 15th international conference on Computer-Aided Verification (CAV'03), Lecture Notes in Computer Science, Springer Verlag, July 2003.
    • (2003) 15th International Conference on Computer-aided Verification (CAV'03)
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 5
    • 20344364980 scopus 로고    scopus 로고
    • Technical Report EVA-6-vl, Verimag, Grenoble, France, May
    • L. Bozga, Y. Lakhnech, and M Périn. L'outil de vérification HERMES. Technical Report EVA-6-vl, Verimag, Grenoble, France, May 2002. Available from http:://www-eva.imag.fr
    • (2002) L'Outil de Vérification HERMES
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 9
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, Vol. 26, No. 2, (1996) 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 10
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • Kemmerer R., Analyzing encryption protocols using formal verification techniques, IEEE Journal on Selected Areas in Communications, 7(4), (1989) 448-457.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.1
  • 11
    • 33750952493 scopus 로고    scopus 로고
    • http://www.avispa-project.org
  • 13
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification
    • International Workshop on Formal Methods for Parallel Programming, Theory and Applications
    • J. Goubault-Larrecq. A method for automatic cryptographic protocol verification. In International Workshop on Formal Methods for Parallel Programming, Theory and Applications. volume 1800 of LNCS, 2000.
    • (2000) LNCS , vol.1800
    • Goubault-Larrecq, J.1
  • 14
    • 24644519551 scopus 로고    scopus 로고
    • Technical report on EVA No 13, Véronique Cortier, December
    • Technical report on EVA No 13, A guide for SECURIFY, Véronique Cortier, December 2003. http://www-eva.imag.fr/bib/EVA-TR13.pdf
    • (2003) A Guide for SECURIFY


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.