메뉴 건너뛰기




Volumn 14, Issue 6, 2006, Pages 561-589

Analysis of probabilistic contract signing

Author keywords

Contract signing; Probabilistic model checking; Security protocols

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER CRIME; NETWORK PROTOCOLS; SECURITY OF DATA; STRATEGIC PLANNING;

EID: 33845202577     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2006-14604     Document Type: Article
Times cited : (39)

References (34)
  • 1
    • 84943242087 scopus 로고    scopus 로고
    • Security analysis of a probabilistic non-repudiation protocol
    • Proc. Second Joint Int. Workshop on Process Algebm and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV), H. Hermanns and R. Segala, eds, Springer
    • A. Aldini and R. Gorrieri, Security analysis of a probabilistic non-repudiation protocol, in: Proc. Second Joint Int. Workshop on Process Algebm and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV), H. Hermanns and R. Segala, eds, Volume 2399 of LNCS, Springer, 2002, pp. 17-36.
    • (2002) LNCS , vol.2399 , pp. 17-36
    • Aldini, A.1    Gorrieri, R.2
  • 5
    • 0032131465 scopus 로고    scopus 로고
    • Model checking for a probabilistic branching time logic with fairness
    • C. Baier and M. Kwiatkowska, Model checking for a probabilistic branching time logic with fairness, Distributed Computing 11(3) (1998), 125-155.
    • (1998) Distributed Computing , vol.11 , Issue.3 , pp. 125-155
    • Baier, C.1    Kwiatkowska, M.2
  • 7
    • 21844505024 scopus 로고
    • Model checking of probabilistic and nondeterministic systems
    • Proc. Foundations of Software Technology and Theoretical Computer Science. (FST/TCS), P. Thiagarajan, ed., Springer
    • A. Bianco and L. De Alfaro, Model checking of probabilistic and nondeterministic systems, in: Proc. Foundations of Software Technology and Theoretical Computer Science. (FST/TCS), P. Thiagarajan, ed., Volume 1026 of LNCS, Springer, 1995, pp. 499-513.
    • (1995) LNCS , vol.1026 , pp. 499-513
    • Bianco, A.1    De Alfaro, L.2
  • 8
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Proc. 20th Annual Int. Cryptology Conference on Advances in Cryptology (CRYPTO), C. Linnhoff-Popien and H. Hegering, eds, Springer
    • D. Boneh and M. Naor, Timed commitments, in: Proc. 20th Annual Int. Cryptology Conference on Advances in Cryptology (CRYPTO), C. Linnhoff-Popien and H. Hegering, eds, Volume 1880 of LNCS, Springer, 2000, pp. 236-254.
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 12
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I. Damgård, Practical and provably secure release of a secret and exchange of signatures, J. Cryptology 8(4) (1995), 201-222.
    • (1995) J. Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 15
    • 33845223165 scopus 로고
    • Technical Report 231, Computer Science Dept., Technion, Israel
    • S. Even, A protocol for signing contracts, Technical Report 231, Computer Science Dept., Technion, Israel, 1982.
    • (1982) A Protocol for Signing Contracts
    • Even, S.1
  • 16
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM 28(6) (1985), 637-647.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 18
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • Proc. CRYPTO'99, M. Wiener, ed., Springer
    • J. Garay, M. Jakobsson and P. MacKenzie, Abuse-free optimistic contract signing, in: Proc. CRYPTO'99, M. Wiener, ed., Volume 1666 of LNCS, Springer, 1999, pp. 449-466.
    • (1999) LNCS , vol.1666 , pp. 449-466
    • Garay, J.1    Jakobsson, M.2    MacKenzie, P.3
  • 19
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, J. ACM 33(4) (1986), 792-807.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 20
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. Gray, Toward a mathematical foundation for information flow security, J. Computer Security 1(3) (1992), 255-294.
    • (1992) J. Computer Security , vol.1 , Issue.3 , pp. 255-294
    • Gray, J.1
  • 21
    • 0003096318 scopus 로고
    • A logic for reasoning about time and probability
    • H. Hansson and B. Jonsson, A logic for reasoning about time and probability, Formal Aspects of Computing 6(5) (1994), 512-535.
    • (1994) Formal Aspects of Computing , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 22
    • 33745802027 scopus 로고    scopus 로고
    • PRISM: A tool for automatic verification of probabilistic systems
    • Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), H. Hermanns and J. Palsberg, eds, Springer
    • A. Hinton, M. Kwiatkowska, G. Norman and D. Parker, PRISM: A tool for automatic verification of probabilistic systems, in: Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), H. Hermanns and J. Palsberg, eds, Volume 3920 of LNCS, Springer, 2006, pp. 441-444.
    • (2006) LNCS , vol.3920 , pp. 441-444
    • Hinton, A.1    Kwiatkowska, M.2    Norman, G.3    Parker, D.4
  • 23
    • 84944080333 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • Proc. CONCUR'01, K. Larsen and M. Nielsen, eds, Springer
    • S. Kremer and J.-F. Raskin, A game-based verification of non-repudiation and fair exchange protocols, in: Proc. CONCUR'01, K. Larsen and M. Nielsen, eds, Volume 2154 of LNCS, Springer, 2001, pp. 551-565.
    • (2001) LNCS , vol.2154 , pp. 551-565
    • Kremer, S.1    Raskin, J.-F.2
  • 25
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • Proc. World Congress on Formal Methods, J. Wing, J. Woodcock and J. Davies, eds, Springer
    • P. Lincoln, J. Mitchell, M. Mitchell and A. Scedrov, Probabilistic polynomial-time equivalence and security analysis, in: Proc. World Congress on Formal Methods, J. Wing, J. Woodcock and J. Davies, eds, Volume 1708 of LNCS, Springer, 1999, pp. 776-793.
    • (1999) LNCS , vol.1708 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 27
    • 24944538962 scopus 로고    scopus 로고
    • Certified e-mail with invisible post offices
    • Presented at
    • S. Micali, Certified e-mail with invisible post offices, Presented at RSA Security Conference, 1997.
    • (1997) RSA Security Conference
    • Micali, S.1
  • 28
    • 35248866592 scopus 로고    scopus 로고
    • Analysis of probabilistic contract signing
    • Proc. 1st International Conference on Formal Aspects of Security (FASec '02), A. Abdallah, P. Ryan and S. Schneider, eds, Springer
    • G. Norman and V. Shmatikov, Analysis of probabilistic contract signing, in: Proc. 1st International Conference on Formal Aspects of Security (FASec '02), A. Abdallah, P. Ryan and S. Schneider, eds, Volume 2629 of LNCS, Springer, 2003, pp. 119-128.
    • (2003) LNCS , vol.2629 , pp. 119-128
    • Norman, G.1    Shmatikov, V.2
  • 29
    • 84892642318 scopus 로고    scopus 로고
    • PRISM web page, http://www.cs.bham.ac.uk/~dxp/prism/.
    • PRISM Web Page
  • 30
    • 0020829007 scopus 로고
    • Transaction protection by beacons
    • M. Rabin, Transaction protection by beacons, J. Computer and System Sciences 27(2) (1983), 256-267.
    • (1983) J. Computer and System Sciences , vol.27 , Issue.2 , pp. 256-267
    • Rabin, M.1
  • 31
    • 27144527964 scopus 로고    scopus 로고
    • Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems, P. Panangaden and F. van Breugel, eds, American Mathematical Society
    • J. Rutten, M. Kwiatkowska, G. Norman and D. Parker, Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems, P. Panangaden and F. van Breugel, eds, Volume 23 of CRM Monograph Series, American Mathematical Society, 2004.
    • (2004) CRM Monograph Series , vol.23
    • Rutten, J.1    Kwiatkowska, M.2    Norman, G.3    Parker, D.4
  • 32
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J. Mitchell, Finite-state analysis of two contract signing protocols, Theoretical Computer Science 283(2) (2002), 419-450.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.2
  • 33
    • 0029504906 scopus 로고
    • The epistemic representation of information flow security in probabilistic systems
    • P. Syverson and J. Gray, The epistemic representation of information flow security in probabilistic systems, in: Proc. 8th IEEE Computer Security Foundations Workshop, 1995, pp. 152-166.
    • (1995) Proc. 8th IEEE Computer Security Foundations Workshop , pp. 152-166
    • Syverson, P.1    Gray, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.