메뉴 건너뛰기




Volumn 79, Issue 3-4, 2007, Pages 363-378

Modelling and checking timed authentication of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CONSTRAINT THEORY; MODEL CHECKING; NETWORK SECURITY;

EID: 34548649341     PISSN: 01692968     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (25)
  • 2
    • 26444497860 scopus 로고    scopus 로고
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganó, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In Proc. of 17th International Conference on Computer Aided Verification (CAV'05), 3576 of LNCS, pages 281-285. Springer-Verlag, 2005.
    • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganó, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In Proc. of 17th International Conference on Computer Aided Verification (CAV'05), volume 3576 of LNCS, pages 281-285. Springer-Verlag, 2005.
  • 3
    • 22944445210 scopus 로고    scopus 로고
    • SATMC: A SAT-based model checker for security protocols
    • Proc. of the 9th European Conference on Logics in Artificial Intelligence JELIA '04, of, Springer
    • A. Armando and L. Compagna. SATMC: A SAT-based model checker for security protocols. In Proc. of the 9th European Conference on Logics in Artificial Intelligence (JELIA '04), volume 3229 of LNCS, pages 730-733. Springer, 2004.
    • (2004) LNCS , vol.3229 , pp. 730-733
    • Armando, A.1    Compagna, L.2
  • 4
    • 14044277509 scopus 로고    scopus 로고
    • An optimized intruder model for SAT-based model-checking of security protocols
    • A. Armando and L. Compagna. An optimized intruder model for SAT-based model-checking of security protocols. ENTCS, 125(1):91-108, 2005.
    • (2005) ENTCS , vol.125 , Issue.1 , pp. 91-108
    • Armando, A.1    Compagna, L.2
  • 9
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • Technical Report 1.0
    • J. A. Clark and J. L. Jacob. A survey of authentication protocol literature. Technical Report 1.0, 1997.
    • (1997)
    • Clark, J.A.1    Jacob, J.L.2
  • 11
    • 40149092144 scopus 로고
    • The tool KRONOS
    • Hybrid Systems III, of, Springer-Verlag
    • C. Daws, A. Olivero, S. Tripakis, and S. Yovine. The tool KRONOS. In Hybrid Systems III, volume 1066 of LNCS, pages 208-219. Springer-Verlag, 1995.
    • (1995) LNCS , vol.1066 , pp. 208-219
    • Daws, C.1    Olivero, A.2    Tripakis, S.3    Yovine, S.4
  • 12
    • 35048864876 scopus 로고    scopus 로고
    • Automatic verification of time sensitive cryptographic protocols
    • Proc. of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS'04, of, Springer
    • G. Delzanno and P. Ganty. Automatic verification of time sensitive cryptographic protocols. In Proc. of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), volume 2988 of LNCS, pages 342-356. Springer, 2004.
    • (2004) LNCS , vol.2988 , pp. 342-356
    • Delzanno, G.1    Ganty, P.2
  • 13
    • 35248826437 scopus 로고    scopus 로고
    • VerICS: A tool for verifying timed automata and Estelle specifications
    • Proc. of the 9th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems TACAS'03, of, Springer-Verlag
    • P. Dembiński, A. Janowska, P. Janowski, W. Penczek, A. Półrola, M. Szreter, B. Woźna, and A. Zbrzezny. VerICS: A tool for verifying timed automata and Estelle specifications. In Proc. of the 9th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'03), volume 2619 of LNCS, pages 278-283. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2619 , pp. 278-283
    • Dembiński, P.1    Janowska, A.2    Janowski, P.3    Penczek, W.4    Półrola, A.5    Szreter, M.6    Woźna, B.7    Zbrzezny, A.8
  • 15
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in CSP using PVS
    • Proc. of the 6th European Symposium on Research in Computer Security ESORICS'00, of, Springer
    • N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In Proc. of the 6th European Symposium on Research in Computer Security (ESORICS'00), volume 1895 of LNCS, pages 222-237. Springer, 2000.
    • (2000) LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 16
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for real-time cryptographic protocol analysis
    • Proc. of the 12th European Symposium on Programming ESOP'03, of, Springer
    • R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In Proc. of the 12th European Symposium on Programming (ESOP'03), volume 2618 of LNCS, pages 114-128. Springer, 2003.
    • (2003) LNCS , vol.2618 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 17
    • 34548660001 scopus 로고    scopus 로고
    • Verifying timed properties of security protocols
    • Technical Report 991, ICS PAS, Ordona 21, 01-237 Warsaw, March
    • G. Jakubowska and W. Penczek. Verifying timed properties of security protocols. Technical Report 991, ICS PAS, Ordona 21, 01-237 Warsaw, March 2006.
    • (2006)
    • Jakubowska, G.1    Penczek, W.2
  • 20
    • 34548632468 scopus 로고    scopus 로고
    • Sat-based verification of security protocols via translation to networks of automata
    • MoChart IV, of, Springer-Verlag
    • M. Kurkowski, W. Penczek, and A. Zbrzezny. Sat-based verification of security protocols via translation to networks of automata. In MoChart IV, volume 4428 of LNAI, pages 146-165. Springer-Verlag, 2007.
    • (2007) LNAI , vol.4428 , pp. 146-165
    • Kurkowski, M.1    Penczek, W.2    Zbrzezny, A.3
  • 21
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 22
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 24
    • 34548609559 scopus 로고    scopus 로고
    • Using the NuSMV model checker to verify the kerberos protocol
    • Society for Computer Simulation
    • M. Panti, L. Spalazzi, and S. Tacconi. Using the NuSMV model checker to verify the kerberos protocol. In Simulation Series, volume 34, pages 230-236. Society for Computer Simulation, 2002.
    • (2002) Simulation Series , vol.34 , pp. 230-236
    • Panti, M.1    Spalazzi, L.2    Tacconi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.