메뉴 건너뛰기




Volumn 15, Issue 6, 2007, Pages 563-617

Dynamic types for authentication

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMIC PROGRAMMING; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS;

EID: 34548820967     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2007-15602     Document Type: Conference Paper
Times cited : (21)

References (36)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, Secrecy by typing in security protocols, JACM 46(5) (1999), 749-786.
    • (1999) JACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theor. Comput. Sci. 298(3) (2003), 387-415.
    • (2003) Theor. Comput. Sci , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theoretical Computer Science 298(3) (2003), 387-415.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 84957795309 scopus 로고    scopus 로고
    • Private authentication
    • Proceedings of the 2002 Workshop on Privacy Enhancing Technologies, Springer-Verlag
    • M. Abadi and C. Fournet, Private authentication, in: Proceedings of the 2002 Workshop on Privacy Enhancing Technologies, LNCS, vol. 2482, Springer-Verlag, 2003, pp. 27-40.
    • (2003) LNCS , vol.2482 , pp. 27-40
    • Abadi, M.1    Fournet, C.2
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148(1) (1999), 1-70.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering 22(1) (1996), 6-15.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 9
    • 85039117324 scopus 로고    scopus 로고
    • C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Riis Nielson, Control flow analysis can find new flaws too, in: Proceedings of the Workshop on Issues on the Theory of Security (WITS'04), ENTCS, Elsevier, 2004.
    • C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Riis Nielson, Control flow analysis can find new flaws too, in: Proceedings of the Workshop on Issues on the Theory of Security (WITS'04), ENTCS, Elsevier, 2004.
  • 10
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Proceedings of ICALP 01, Springer-Verlag
    • M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Proceedings of ICALP 01, LNCS, vol. 2076, Springer-Verlag, 2001, pp. 667-681.
    • (2001) LNCS , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 12
    • 35248816980 scopus 로고    scopus 로고
    • Principles for entity authentication
    • Proceedings of 5th International Conference Perspectives of System Informatics PSI 2003, SpringerVerlag
    • M. Bugliesi, R. Focardi and M. Maffei, Principles for entity authentication, in: Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003), LNCS, vol. 2890, SpringerVerlag, 2003, pp. 294-307.
    • (2003) LNCS , vol.2890 , pp. 294-307
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 14
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Proceedings of European Symposium on Programming ESOP 2004, Springer-Verlag
    • M. Bugliesi, R. Focardi and M. Maffei, Compositional analysis of authentication protocols, in: Proceedings of European Symposium on Programming (ESOP 2004), LNCS, vol. 2986, Springer-Verlag, 2004, pp. 140-154.
    • (2004) LNCS , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 16
    • 34548864135 scopus 로고    scopus 로고
    • A derivation system for security protocols and its logical formalization
    • A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system for security protocols and its logical formalization, in: CSFW, 2003, pp. 109-125.
    • (2003) CSFW , pp. 109-125
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 18
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. Mitchell and D. Pavlovic, A compositional logic for proving security properties of protocols, Journal of Computer Security 11(4) (2004), 677-721.
    • (2004) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 20
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. Gordon and A. Jeffrey, Authenticity by typing for security protocols, Journal of Computer Security 11(4) (2004), 451-519.
    • (2004) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-519
    • Gordon, A.1    Jeffrey, A.2
  • 21
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Journal of Computer Security 12(3/4) (2004), 435-484.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.1    Jeffrey, A.2
  • 22
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • Springer-Verlag
    • A. Gordon, and A. Jeffrey, Secrecy despite compromise: types, cryptography, and the pi-calculus, in: Proceedings of Concur 2005, Springer-Verlag, 2005, pp. 186-201.
    • (2005) Proceedings of Concur 2005 , pp. 186-201
    • Gordon, A.1    Jeffrey, A.2
  • 23
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J.D. Guttman and F.J. Thayer, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 24
    • 35048867881 scopus 로고    scopus 로고
    • Trust management in strand spaces: A rely-guarantee method
    • Proceedings of European Symposium on Programming ESOP 2004, Springer-Verlag
    • J.D. Guttman, F.J. Thayer, J.A. Carlson, J.C. Herzog, J.D. Ramsdell and B.T. Sniffen, Trust management in strand spaces: a rely-guarantee method, in: Proceedings of European Symposium on Programming (ESOP 2004), LNCS, vol. 2986, Springer-Verlag, 2004, pp. 325-339.
    • (2004) LNCS , vol.2986 , pp. 325-339
    • Guttman, J.D.1    Thayer, F.J.2    Carlson, J.A.3    Herzog, J.C.4    Ramsdell, J.D.5    Sniffen, B.T.6
  • 28
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems TACAS, SpringerVerlag
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS), LNCS, vol. 1055, SpringerVerlag, 1996, pp. 147-166.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 30
    • 20144369157 scopus 로고    scopus 로고
    • A family of attacks upon authentication protocols
    • Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester
    • G. Lowe, A family of attacks upon authentication protocols, Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester, 1997.
    • (1997)
    • Lowe, G.1
  • 31
    • 27844540827 scopus 로고    scopus 로고
    • Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer
    • C. Meadows and P. Syverson, Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer, Journal of Computer Security 12(6) (2004), 893-931.
    • (2004) Journal of Computer Security , vol.12 , Issue.6 , pp. 893-931
    • Meadows, C.1    Syverson, P.2
  • 32
    • 84955583138 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • C. Meadows, Open issues in formal methods for cryptographic protocol analysis, LNCS, vol. 2052 (2001), pp. 21-36.
    • (2001) LNCS , vol.2052 , pp. 21-36
    • Meadows, C.1
  • 34
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • J. Thayer, J. Herzog and J. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Thayer, J.1    Herzog, J.2    Guttman, J.3
  • 35
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T.Y.C. Woo and S.S. Lam, A lesson on authentication protocol design. Operating Systems Review, 28(3) (1994), 24-37.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.