메뉴 건너뛰기




Volumn , Issue , 2006, Pages 345-346

Provable implementations of security protocols

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34547302855     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LICS.2006.43     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 2
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, of, Springer
    • R. Anderson and R. Needham. Programming Satan's computer. In J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, volume 1000 of LNCS, pages 426-440. Springer, 1995.
    • (1995) LNCS , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 5
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web services
    • International Symposium on Formal Methods for Components and Objects FMCO'03, of, Springer
    • K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004.
    • (2004) LNCS , vol.3188 , pp. 197-222
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Pucella, R.4
  • 8
    • 0033718532 scopus 로고    scopus 로고
    • TAPS : A first-order verifier for cryptographic protocols
    • IEEE Computer Society Press
    • E. Cohen. TAPS : A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • Cohen, E.1
  • 9
    • 34547282572 scopus 로고    scopus 로고
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208,1983. [10] J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), 3385 ïéLNCS, pages 363-379. Springer, 2005.
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208,1983. [10] J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 ïéLNCS, pages 363-379. Springer, 2005.
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21 (12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 12
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - automatic generation, verification, and implementation of security protocols
    • 13th Conference on Computer Aided Verification CAV, Springer
    • A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
    • (2001) LNCS , pp. 241-245
    • Perrig, A.1    Song, D.2    Phan, D.3
  • 14
    • 34547371390 scopus 로고    scopus 로고
    • D. Syme. F#, 2005. Project website at http:// research.microsoft.com/ fsharp/.
    • D. Syme. F#, 2005. Project website at http:// research.microsoft.com/ fsharp/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.