메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 109-125

A derivation system for security protocols and its logical formalization

Author keywords

Authentication; Computer science; Cryptography; Internet; Jacobian matrices; Logic; Protocols; Public key; Security; Sociotechnical systems

Indexed keywords

AUTHENTICATION; COMPUTER SCIENCE; CRYPTOGRAPHY; INTERNET; JACOBIAN MATRICES; NETWORK PROTOCOLS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 34548864135     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212708     Document Type: Conference Paper
Times cited : (67)

References (26)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Expanded version available as SRC Research Report January
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
    • (1998) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 15
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key protocol
    • G. Lowe. An attack on the Needham-Schroeder public-key protocol. Info. Proc. Letters, 56:131-133, 1995.
    • (1995) Info. Proc. Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 18
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 20
    • 0141546693 scopus 로고
    • Action structures
    • Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December
    • Robin Milner. Action structures. LFCS report ECS-LFCS-92-249, Department of Computer Science, University of Edinburgh, JCMB, The Kings Buildings, Mayfield Road, Edinburgh, December 1992.
    • (1992) LFCS Report
    • Milner, R.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 24
    • 85013569711 scopus 로고    scopus 로고
    • Categorical logic of names and abstraction in action calculi
    • D. Pavlovic. Categorical logic of names and abstraction in action calculi.Math. Structures in Comp. Sci., 7(6):619-637, 1997.
    • (1997) Math. Structures in Comp. Sci. , vol.7 , Issue.6 , pp. 619-637
    • Pavlovic, D.1
  • 25
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes and Cryptography, 7(1-2):27-59, 1996.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.