메뉴 건너뛰기




Volumn 4167 LNCS, Issue , 2006, Pages 238-253

Time-bounded task-PIQAs: A framework for analyzing security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; NETWORK PROTOCOLS; PROBABILITY; SCHEDULING;

EID: 33845213035     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11864219_17     Document Type: Conference Paper
Times cited : (34)

References (22)
  • 2
    • 33751043253 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • [Bla05]
    • [Bla05] B. Blanchet. A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive, Report 2005/401, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.401
    • Blanchet, B.1
  • 4
    • 38149024828 scopus 로고    scopus 로고
    • The game-playing technique and its application to triple encryption
    • [BR04]
    • [BR04] M. Bellare and P. Rogaway. The game-playing technique and its application to triple encryption. Cryptology ePrint Archive, Report 2004/331, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.331
    • Bellare, M.1    Rogaway, P.2
  • 9
  • 10
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • [EGL85]
    • [EGL85] S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. CACM, 28(6):637-647, 1985.
    • (1985) CACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 11
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • [GMR89]
    • [GMR89] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 13
    • 0003979335 scopus 로고    scopus 로고
    • [Gol01] volume I Basic Tools. Cambridge Universirty Press
    • [Gol01] O. Goldreich. Foundations of Cryptography, volume I Basic Tools. Cambridge Universirty Press, 2001.
    • (2001) Foundations of Cryptography
    • Goldreich, O.1
  • 14
    • 33746336609 scopus 로고    scopus 로고
    • A plausible approach to computer-aided cryptographic proofs
    • [Hal05]
    • [Hal05] S. Halevi. A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005/181, 2005. http://eprint.iacr. org/.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.181
    • Halevi, S.1
  • 16
    • 35248861970 scopus 로고    scopus 로고
    • Composition of cryptographic protocols in a probabilistic polynomial-time calculus
    • [MMS03] Proceedings of the 14th International Conference on Concurrency Theory (CONCUR)
    • [MMS03] P. Mateus, J.C. Mitchell, and A. Scedrov. Composition of cryptographic protocols in a probabilistic polynomial-time calculus. In Proceedings of the 14th International Conference on Concurrency Theory (CONCUR), volume 2761 of LNCS, pages 327-349, 2003.
    • (2003) LNCS , vol.2761 , pp. 327-349
    • Mateus, P.1    Mitchell, J.C.2    Scedrov, A.3
  • 18
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • [PW01]
    • [PW01] B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-200, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 19
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • [RMST04] Proceedings of Foundations of Sotware Science and Computation Structires (FOSSACS)
    • [RMST04] A. Ramanathan, J.C. Mitchell, A. Scedrov, and V. Teague. Probabilistic bisimulation and equivalence for security analysis of network protocols. In Proceedings of Foundations of Sotware Science and Computation Structires (FOSSACS), volume 2987 of LNCS, pages 468-483, 2004.
    • (2004) LNCS , vol.2987 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.C.2    Scedrov, A.3    Teague, V.4
  • 20
    • 0004181981 scopus 로고
    • [Seg95] PhD thesis, Department of Electrical Engineering and Computer Science, MIT, May Also, MIT/LCS/TR-676
    • [Seg95] Roberto Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, May 1995. Also, MIT/LCS/TR-676.
    • (1995) Modeling and Verification of Randomized Distributed Real-Time Systems
    • Segala, R.1
  • 21
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • [Sho04]
    • [Sho04] V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.332
    • Shoup, V.1
  • 22
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • [SL95] August
    • [SL95] Roberto Segala and Nancy Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, August 1995.
    • (1995) Nordic Journal of Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.