메뉴 건너뛰기




Volumn 4166 LNCS, Issue , 2006, Pages 42-56

Verifying a chipcard-based biometric identification protocol in VSE

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HEURISTIC METHODS; MICROPROCESSOR CHIPS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33750971743     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11875567_4     Document Type: Conference Paper
Times cited : (6)

References (29)
  • 2
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 3
    • 84941182030 scopus 로고    scopus 로고
    • The Verisoft Project, http://www.verisoft.de/.
  • 4
    • 85189862740 scopus 로고    scopus 로고
    • Vertrauenswüdige chipkartenbasierte biometrische authentifikation
    • Jana Dittmann (Hrsg.), Sicherheit 2006, Sicherheit-Schutz und Zuverlässigkeit, Gesellschaft fr Informatik, Bonn
    • G. Lassmann, M. Schwan. Vertrauenswüdige Chipkartenbasierte Biometrische Authentifikation. In Jana Dittmann (Hrsg.), Sicherheit 2006, Sicherheit-Schutz und Zuverlässigkeit, GI-Edition Lectures Notes in Informatics, Gesellschaft fr Informatik, Bonn, 2006.
    • (2006) GI-edition Lectures Notes in Informatics
    • Lassmann, G.1    Schwan, M.2
  • 6
    • 0003902378 scopus 로고    scopus 로고
    • The CAPSL integrated protocol environment
    • protocol October
    • G. Denker and J. Millen and H. Rueß. The CAPSL Integrated Protocol Environment, protocol. SRI Technical Report SRI-CSL-2000-02, October 2000.
    • (2000) SRI Technical Report , vol.SRI-CSL-2000-02
    • Denker, G.1    Millen, J.2    Rueß, H.3
  • 7
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2): 113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 8
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 9
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Software - Concepts and Tools, 17:93-102, 1996.
    • (1996) Software - Concepts and Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 11
    • 84957639842 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols, Towards an automatic analysis of security protocols
    • Proceedings of the 16th International Conference on Automated Deduction, Springer-Verlag
    • C. Weidenbach, Towards an automatic analysis of security protocols, Towards an automatic analysis of security protocols. In Proceedings of the 16th International Conference on Automated Deduction, pages 378-382. LNCS 1632, Springer-Verlag, 1999
    • (1999) LNCS , vol.1632 , pp. 378-382
    • Weidenbach, C.1
  • 16
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • Secure Networking - CQRE [Secure] '99, Springer-Verlag, Dsseldorf, Germany, November
    • David Basin, Lazy Infinite-State Analysis of Security Protocols, Secure Networking - CQRE [Secure] '99, Springer-Verlag, Lecture Notes in Computer Science, no. 1740, pp. 30-42, Dsseldorf, Germany, November, 1999
    • (1999) Lecture Notes in Computer Science , vol.1740 , pp. 30-42
    • Basin, D.1
  • 20
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • LNCS 2071, Springer
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings ICALP'01, LNCS 2071, pp. 667 - 681. Springer, 2001
    • (2001) Proceedings ICALP'01 , pp. 667-681
    • Boreale, M.1
  • 22
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. X. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1, 2):47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3
  • 27
    • 0442315610 scopus 로고    scopus 로고
    • Modular reasoning about structured TLA specifications
    • R. Berghammer and Y. Lakhnech, editors, Advances in Computing Science. Springer, WienNewYork
    • Georg Rock, Werner Stephan, and Andreas Wolpers. Modular Reasoning about Structured TLA Specifications. In R. Berghammer and Y. Lakhnech, editors, Tool Support for System Specification, Development and Verification, Advances in Computing Science, pages 217-229. Springer, WienNewYork, 1999.
    • (1999) Tool Support for System Specification, Development and Verification , pp. 217-229
    • Rock, G.1    Stephan, W.2    Wolpers, A.3
  • 28
    • 33751009888 scopus 로고    scopus 로고
    • Assumption-commitment specifications and safety-critical systems
    • Hartmut Knig and Peter Langendrfer, editors. Shaker Verlag, Aachen, 8. GI/ITG-Fachgespräch
    • Georg Rock, Werner Stephan, and Andreas Wolpers. Assumption-Commitment Specifications and Safety-Critical Systems. In Hartmut Knig and Peter Langendrfer, editors, FBT'98. Formale Beschreibungstechniken für verteilte Systeme, pages 125-135. Shaker Verlag, Aachen, 1998. 8. GI/ITG- Fachgespräch.
    • (1998) FBT'98. Formale Beschreibungstechniken für Verteilte Systeme , pp. 125-135
    • Rock, G.1    Stephan, W.2    Wolpers, A.3
  • 29
    • 33751005804 scopus 로고    scopus 로고
    • Verification support environment
    • Dieter Hutter and Werner Stephan, editors, Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, Springer Verlag January, ISBN 3540250514
    • Werner Stephan, Bruno Langenstein, Andreas Nonnengart, and Georg Rock. Verification Support Environment. In Dieter Hutter and Werner Stephan, editors, Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, LNAI2605, pages 476 - 493, Springer Verlag January 2005, ISBN 3540250514
    • (2005) LNAI , vol.2605 , pp. 476-493
    • Stephan, W.1    Langenstein, B.2    Nonnengart, A.3    Rock, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.