메뉴 건너뛰기




Volumn , Issue , 2006, Pages 23-32

An intruder model for verifying liveness in security protocols

Author keywords

Dolev Yao intruder; Intruder models; Liveness properties; Security protocols

Indexed keywords

BOOLEAN ALGEBRA; MATHEMATICAL MODELS; NETWORK PROTOCOLS; TIME DELAY;

EID: 34547372939     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180337.1180340     Document Type: Article
Times cited : (11)

References (37)
  • 1
    • 35248848311 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • SAS '03, of
    • M. Abadi and B. Blanchet. Computer-assisted verification of a protocol for certified email. In SAS '03, volume 2694 of LNCS, pages 316-335, 2003.
    • (2003) LNCS , vol.2694 , pp. 316-335
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Eng., 22(1):6-15, 1996.
    • (1996) IEEE Trans. Software Eng , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 34547286095 scopus 로고
    • Defining liveness
    • 85-650, Dept. of Computer Science, Cornell University, October
    • B. Alpern and F. Schneider. Defining liveness. Technical Report TR 85-650, Dept. of Computer Science, Cornell University, October 1984.
    • (1984) Technical Report TR
    • Alpern, B.1    Schneider, F.2
  • 5
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan and P. Ginzboorg. Key agreement in ad hoc networks. Computer Communications, 23(17):1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 8
    • 84937578206 scopus 로고    scopus 로고
    • Simulating reliable links with unreliable links in the presence of process crashes
    • WDAG '96, of, Springer
    • A. Basu, B. Charron-Bost, and S. Toueg. Simulating reliable links with unreliable links in the presence of process crashes. In WDAG '96, volume 1151 of LNCS, pages 105-122. Springer, 1996.
    • (1996) LNCS , vol.1151 , pp. 105-122
    • Basu, A.1    Charron-Bost, B.2    Toueg, S.3
  • 9
    • 84949486769 scopus 로고    scopus 로고
    • Mechanical proofs about a non-repudiation protocol
    • TPHOL'01, of, Springer
    • G. Bella and L. C. Paulson. Mechanical proofs about a non-repudiation protocol. In TPHOL'01, volume 2152 of LNCS, pages 91-104. Springer, 2001.
    • (2001) LNCS , vol.2152 , pp. 91-104
    • Bella, G.1    Paulson, L.C.2
  • 10
    • 0021870594 scopus 로고
    • Algebra of communicating processes with abstraction
    • J. Bergstra and J. Klop. Algebra of communicating processes with abstraction. Theor. Comput. Sci., 37:77-121, 1985.
    • (1985) Theor. Comput. Sci , vol.37 , pp. 77-121
    • Bergstra, J.1    Klop, J.2
  • 11
    • 33646736777 scopus 로고    scopus 로고
    • On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
    • ICICS'05, of, Springer
    • J. Cederquist, R. Corin, and M. Torabi Dashti. On the quest for impartiality: Design and analysis of a fair non-repudiation protocol. In ICICS'05, volume 3783 of LNCS, pages 27 - 39. Springer, 2005.
    • (2005) LNCS , vol.3783 , pp. 27-39
    • Cederquist, J.1    Corin, R.2    Torabi Dashti, M.3
  • 13
    • 20144373491 scopus 로고    scopus 로고
    • The Dolev-Yao intruder is the most powerful attacker
    • IEEE Computer Society Press, 16-19 June
    • I. Cervesato. The Dolev-Yao intruder is the most powerful attacker. In LICS'01. IEEE Computer Society Press, 16-19 June 2001.
    • (2001) LICS'01
    • Cervesato, I.1
  • 14
    • 84937559950 scopus 로고    scopus 로고
    • Automated unbounded verification of security protocols
    • CAV '02, of, Springer
    • Y. Chevalier and L. Vigneron. Automated unbounded verification of security protocols. In CAV '02, volume 2404 of LNCS, pages 324-337. Springer, 2002.
    • (2002) LNCS , vol.2404 , pp. 324-337
    • Chevalier, Y.1    Vigneron, L.2
  • 16
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans, on Information Theory, IT-29(2):198-208, 1983.
    • (1983) IEEE Trans, on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 17
    • 34547382108 scopus 로고    scopus 로고
    • E. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of theoretical computer science (B): formal models and semantics, pages 995-1072. MIT Press, 1990.
    • E. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of theoretical computer science (vol. B): formal models and semantics, pages 995-1072. MIT Press, 1990.
  • 18
    • 16244392334 scopus 로고
    • Temporal reasoning under generalized fairness constraints
    • Springer-Verlag
    • E. Emerson and C-L. Lei. Temporal reasoning under generalized fairness constraints. In STACS '86, pages 21-36. Springer-Verlag, 1985.
    • (1985) STACS '86 , pp. 21-36
    • Emerson, E.1    Lei, C.-L.2
  • 19
    • 34547240491 scopus 로고    scopus 로고
    • R. Engelschall. URL rewriting engine. Apache HTTP Server Version 1.3
    • R. Engelschall. URL rewriting engine. Apache HTTP Server Version 1.3.
  • 20
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.1    Lynch, N.2    Paterson, M.3
  • 22
    • 0001879305 scopus 로고
    • The syntax and semantics of μCRL
    • Algebra of Communicating Processes, Springer
    • J. F. Groóte and A. Ponse. The syntax and semantics of μCRL. In Algebra of Communicating Processes, Workshops in Computing Series, pages 26-62. Springer, 1995.
    • (1995) Workshops in Computing Series , pp. 26-62
    • Groóte, J.F.1    Ponse, A.2
  • 23
    • 35248837018 scopus 로고    scopus 로고
    • On the security of fair non-repudiation protocols
    • ISC '03, of
    • S. Gürgens, C. Rudolph, and H. Vogt. On the security of fair non-repudiation protocols. In ISC '03, volume 2851 of LNCS, pages 193-207, 2003.
    • (2003) LNCS , vol.2851 , pp. 193-207
    • Gürgens, S.1    Rudolph, C.2    Vogt, H.3
  • 24
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. J. Computer Security, 11(2):217-244, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 25
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • C. A. R. Hoare. Communicating sequential processes. Commun. ACM, 21(8):666-677, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.8 , pp. 666-677
    • Hoare, C.A.R.1
  • 26
    • 27244431635 scopus 로고    scopus 로고
    • Constraint solving for contract-signing protocols
    • CONCUR '05, of, Springer
    • D. Kahler and R. Küsters. Constraint solving for contract-signing protocols. In CONCUR '05, volume 3653 of LNCS, pages 233-247. Springer, 2005.
    • (2005) LNCS , vol.3653 , pp. 233-247
    • Kahler, D.1    Küsters, R.2
  • 27
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of non-repudiation protocols
    • November
    • S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of non-repudiation protocols. Computer Communications, 25(17):1606-1621, November 2002.
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 28
    • 84944080333 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • CONCUR '01, of, Springer
    • S. Kremer and J. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In CONCUR '01, volume 2154 of LNCS, pages 551-565. Springer, 2001.
    • (2001) LNCS , vol.2154 , pp. 551-565
    • Kremer, S.1    Raskin, J.2
  • 29
    • 0037332768 scopus 로고    scopus 로고
    • Efficient on-the-fly model-checking for regular alternation-free mu-calculus
    • R. Mateescu and M. Sighireanu. Efficient on-the-fly model-checking for regular alternation-free mu-calculus. Sei. Comput. Program., 46(3):255-281, 2003.
    • (2003) Sei. Comput. Program , vol.46 , Issue.3 , pp. 255-281
    • Mateescu, R.1    Sighireanu, M.2
  • 30
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • C. Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE J. Selected Areas in Communication, 21(2):44-54, 2003.
    • (2003) IEEE J. Selected Areas in Communication , vol.21 , Issue.2 , pp. 44-54
    • Meadows, C.1
  • 31
    • 0029272304 scopus 로고
    • Three logics for branching bisimulation
    • R. De Nicola and F. Vaandrager. Three logics for branching bisimulation. J. ACM, 42(2):458-487, 1995.
    • (1995) J. ACM , vol.42 , Issue.2 , pp. 458-487
    • De Nicola, R.1    Vaandrager, F.2
  • 32
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1-2):85-128, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.1
  • 33
    • 49149133038 scopus 로고
    • a temporal logic of concurrent programs
    • A. Pnueli. a temporal logic of concurrent programs. Theor. Comput. Sci., 13:45 - 60, 1981.
    • (1981) Theor. Comput. Sci , vol.13 , pp. 45-60
    • Pnueli, A.1
  • 34
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J. Mitchell. Finite-state analysis of two contract signing protocols. Theor. Comput. Sci., 283(2):419-450, 2002.
    • (2002) Theor. Comput. Sci , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.2
  • 35
    • 34547265412 scopus 로고    scopus 로고
    • Asynchronous optimistic fair exchange based on revocable items
    • Financial Cryptography, of, Springer
    • H. Vogt. Asynchronous optimistic fair exchange based on revocable items. In Financial Cryptography, volume 2742 of LNCS, pages 208-222. Springer, 2003.
    • (2003) LNCS , vol.2742 , pp. 208-222
    • Vogt, H.1
  • 36
    • 84949477184 scopus 로고    scopus 로고
    • Using smart cards for fair exchange
    • WELCOM '01, of, Springer
    • H. Vogt, H. Pagnia, and F. Gärtner. Using smart cards for fair exchange. In WELCOM '01, volume 2232 of LNCS, pages 101-113. Springer, 2001.
    • (2001) LNCS , vol.2232 , pp. 101-113
    • Vogt, H.1    Pagnia, H.2    Gärtner, F.3
  • 37
    • 84961312272 scopus 로고    scopus 로고
    • Evolution of fair non-repudiation with TTP
    • ACISP '99, of, Springer
    • J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In ACISP '99, volume 1587 of LNCS, pages 258-269. Springer, 1999.
    • (1999) LNCS , vol.1587 , pp. 258-269
    • Zhou, J.1    Deng, R.2    Bao, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.