메뉴 건너뛰기




Volumn 171, Issue 4, 2007, Pages 23-36

Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer

Author keywords

Cryptographic Protocol Verification; Equational Reasoning; Maude; Narrowing; Rewriting Logic

Indexed keywords

ALGEBRA; COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; NUMERICAL METHODS;

EID: 34250834342     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.02.053     Document Type: Article
Times cited : (15)

References (20)
  • 2
    • 0346205107 scopus 로고    scopus 로고
    • Unification theory
    • Robinson A., and Voronkov A. (Eds), Elsevier Science
    • Baader F., and Snyder W. Unification theory. In: Robinson A., and Voronkov A. (Eds). Handbook of Automated Reasoning, Volume 1 (2001), Elsevier Science 445-532
    • (2001) Handbook of Automated Reasoning, Volume 1 , pp. 445-532
    • Baader, F.1    Snyder, W.2
  • 3
    • 33646262130 scopus 로고    scopus 로고
    • Algebraic intruder deductions
    • LPAR. Sutcliffe G., and Voronkov A. (Eds)
    • Basin D.A., Mödersheim S., and Viganò L. Algebraic intruder deductions. In: Sutcliffe G., and Voronkov A. (Eds). LPAR. Lecture Notes in Computer Science 3835 (2005) 549-564
    • (2005) Lecture Notes in Computer Science , vol.3835 , pp. 549-564
    • Basin, D.A.1    Mödersheim, S.2    Viganò, L.3
  • 4
    • 34250827578 scopus 로고    scopus 로고
    • Baugher, M., B. Weis, T. Hardjono and H. Harney, The group domain of intepretation, in: Internet Engineering Task Force, RFC 3547, 2003
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • Blanchet, B., An efficient cryptographic protocol verifier based on prolog rules., in: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-14) (2001), pp. 82-96
  • 7
    • 34250867750 scopus 로고    scopus 로고
    • Cremers, C., "Scyther - Semantics and Verification of Security Protocols," Ph.D. dissertation, Eindhoven University of Technology (2006)
  • 8
    • 84858564688 scopus 로고
    • Decidable matching for convergent systems (preliminary version)
    • 11th International Conference on Automated Deduction. Kapur D. (Ed). (CADE-11)
    • Dershowitz N., Mitra S., and Sivakumar G. Decidable matching for convergent systems (preliminary version). In: Kapur D. (Ed). 11th International Conference on Automated Deduction. (CADE-11). Lecture Notes in Computer Science 607 (1992) 589-602
    • (1992) Lecture Notes in Computer Science , vol.607 , pp. 589-602
    • Dershowitz, N.1    Mitra, S.2    Sivakumar, G.3
  • 10
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
    • Escobar S., Meadows C., and Meseguer J. A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theoretical Computer Science 367 (2006) 162-202
    • (2006) Theoretical Computer Science , vol.367 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 12
    • 0033683193 scopus 로고    scopus 로고
    • Heather, J., G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000), pp. 255-268
  • 13
    • 85035020357 scopus 로고
    • Canonical forms and unification
    • 5th Conference on Automated Deduction. Bibel W., and Kowalski R. (Eds)
    • Hullot J. Canonical forms and unification. In: Bibel W., and Kowalski R. (Eds). 5th Conference on Automated Deduction. Lecture Notes in Computer Science 87 (1980) 318-334
    • (1980) Lecture Notes in Computer Science , vol.87 , pp. 318-334
    • Hullot, J.1
  • 14
    • 34250840918 scopus 로고    scopus 로고
    • Kapur, D., P. Narendran and L. Wang, An E-unification algorithm for analyzing protocols that use modular exponentiation, Technical Report TR-03-2, CS Dept. SUNY Albany (2003)
  • 15
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Meadows C. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security 1 (1992)
    • (1992) Journal of Computer Security , vol.1
    • Meadows, C.1
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An overview
    • Meadows C. The NRL Protocol Analyzer: An overview. The Journal of Logic Programming 26 (1996) 113-131
    • (1996) The Journal of Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 17
    • 27844540827 scopus 로고    scopus 로고
    • Specification of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer
    • Meadows C., Cervesato I., and Syverson P. Specification of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12 (2004) 893-932
    • (2004) Journal of Computer Security , vol.12 , pp. 893-932
    • Meadows, C.1    Cervesato, I.2    Syverson, P.3
  • 18
    • 34250819628 scopus 로고    scopus 로고
    • Meadows, C. and P. Narendran, A unification algorithm for the group Diffie-Hellman protocol, in: Proc. Workshop on Issues in the Theory of Security WITS 2002, 2002
  • 19
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • Meseguer J. Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science 96 (1992) 73-155
    • (1992) Theoretical Computer Science , vol.96 , pp. 73-155
    • Meseguer, J.1
  • 20
    • 0033741481 scopus 로고    scopus 로고
    • Formal characterization and automated analysis of known-pair and chosen-text attacks
    • Stubblebine S., and Meadows C. Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE Journal on Selected Areas in Communications 18 (2000) 571-581
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , pp. 571-581
    • Stubblebine, S.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.