메뉴 건너뛰기




Volumn 173, Issue SPEC. ISS., 2007, Pages 85-102

Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions

Author keywords

enumerating protocol executions; mechanizing protocol analysis; protocol analysis; strand spaces

Indexed keywords

CRYPTOGRAPHY; INFORMATION ANALYSIS;

EID: 33847679489     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.02.029     Document Type: Article
Times cited : (6)

References (9)
  • 1
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Foundations of Software Science and Computation Structures. Gordon A.D. (Ed), Springer
    • Blanchet B., and Podelski A. Verification of cryptographic protocols: Tagging enforces termination. In: Gordon A.D. (Ed). Foundations of Software Science and Computation Structures. LNCS number 2620 (April 2003), Springer 136-152
    • (2003) LNCS , vol.number 2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 2
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • Tools and Algorithms for Construction and Analysis of Systems (TACAS), Springer Extended version at URL
    • Doghmi S.F., Guttman J.D., and Javier Thayer F. Searching for shapes in cryptographic protocols. Tools and Algorithms for Construction and Analysis of Systems (TACAS). LNCS (March 2007), Springer. http://eprint.iacr.org/2006/435 Extended version at URL
    • (2007) LNCS
    • Doghmi, S.F.1    Guttman, J.D.2    Javier Thayer, F.3
  • 3
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • Foundations of Security Analysis and Design. Gorrieri R., and Focardi R. (Eds), Springer Verlag
    • Guttman J.D. Security goals: Packet trajectories and strand spaces. In: Gorrieri R., and Focardi R. (Eds). Foundations of Security Analysis and Design. LNCS volume 2171 (2001), Springer Verlag 197-261
    • (2001) LNCS , vol.2171 , pp. 197-261
    • Guttman, J.D.1
  • 4
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • Guttman J.D., and Javier Thayer F. Authentication tests and the structure of bundles. Theoretical Computer Science 283 2 (June 2002) 333-380
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Javier Thayer, F.2
  • 5
    • 27844571925 scopus 로고    scopus 로고
    • The faithfulness of abstract protocol analysis: Message authentication
    • Guttman J.D., Javier Thayer F., and Zuck L.D. The faithfulness of abstract protocol analysis: Message authentication. Journal of Computer Security 12 6 (2004) 865-891
    • (2004) Journal of Computer Security , vol.12 , Issue.6 , pp. 865-891
    • Guttman, J.D.1    Javier Thayer, F.2    Zuck, L.D.3
  • 6
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceeedings of tacas, Springer Verlag
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceeedings of tacas. Lecture Notes in Computer Science volume 1055 (1996), Springer Verlag 147-166
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 8
    • 33847640933 scopus 로고    scopus 로고
    • R. Ramanujam and S.P. Suresh. A decidable subclass of unbounded security protocol. In R. Gorrieri, editor, WITS '03: Workshop on Issues in the Theory of Security, pages 11-20, Warsaw, April 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.