메뉴 건너뛰기




Volumn , Issue , 2007, Pages 355-369

Causality-based abstraction of multiplicity in security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; FORMAL LOGIC; GRAPH THEORY; SECURITY OF DATA; SEMANTICS;

EID: 35048817493     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.11     Document Type: Conference Paper
Times cited : (20)

References (33)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Proc. 4th International Conference on Foundations of Software Science and Computation Structures FOSSACS, of, Springer-Verlag
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS
    • Advances in Cryptology: CRYPTO '98, of, Springer-Verlag
    • D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS. In Advances in Cryptology: CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 9
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • 28rd International Colloquium on Automata, Languages and Programming ICALP 2001, Springer-Verlag
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In 28rd International Colloquium on Automata, Languages and Programming (ICALP 2001), Lecture Notes in Computer Science, pages 667-681. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , pp. 667-681
    • Boreale, M.1
  • 11
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Proc. 13th European Symposium on Programming ESOP, of, Springer-Verlag
    • M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In Proc. 13th European Symposium on Programming (ESOP), volume 2986 of Lecture Notes in Computer Science, pages 140-154. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 12
    • 34548820967 scopus 로고    scopus 로고
    • M. Bugliesi, R. Focardi, and M. Maffei. Dynamic types for authentication, 2007. To appear in Journal of Computer Security.
    • M. Bugliesi, R. Focardi, and M. Maffei. Dynamic types for authentication, 2007. To appear in Journal of Computer Security.
  • 13
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM Press
    • P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. 4th Symposium on Principles of Programming Languages (POPL), pages 238-252. ACM Press, 1977.
    • (1977) Proc. 4th Symposium on Principles of Programming Languages (POPL) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 15
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 16
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, Springer-Verlag
    • S. Doghmi, J. Guttman, and F. Thayer. Searching for shapes in cryptographic protocols. In Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science, pages 523-538. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 523-538
    • Doghmi, S.1    Guttman, J.2    Thayer, F.3
  • 18
    • 35048829696 scopus 로고    scopus 로고
    • L. S. et Vérification. Security protocols open repository. http://www.lsv.ens-cachan.fr/spore/.
    • L. S. et Vérification. Security protocols open repository. http://www.lsv.ens-cachan.fr/spore/.
  • 20
    • 18744402837 scopus 로고    scopus 로고
    • Millions of .Net Passport accounts put at risk
    • May, Flaw detected by Muhammad Faisal Rauf Danka
    • D. Fisher. Millions of .Net Passport accounts put at risk. eWeek, May 2003. (Flaw detected by Muhammad Faisal Rauf Danka).
    • (2003) eWeek
    • Fisher, D.1
  • 21
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • Proc. 14th European Symposium on Programming ESOP, Springer-Verlag
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In Proc. 14th European Symposium on Programming (ESOP), Lecture Notes in Computer Science, pages 141-156. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 23
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3):435-484, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 25
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real c code
    • Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, of, Springer-Verlag
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real c code. In Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 26
    • 35048867881 scopus 로고    scopus 로고
    • Trust management in strand spaces: A rely-guarantee method
    • Proc. 13th European Symposium on Programming ESOP, of, Springer-Verlag
    • J. Guttman, F. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In Proc. 13th European Symposium on Programming (ESOP), volume 2986 of Lecture Notes in Computer Science, pages 325-339. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 325-339
    • Guttman, J.1    Thayer, F.2    Carlson, J.A.3    Herzog, J.C.4    Ramsdell, J.D.5    Sniffen, B.T.6
  • 27
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J. D. Guttman and F. J. Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 12(21):993-999, 1978.
    • (1978) Communications of the ACM , vol.12 , Issue.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 33
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T. Y. C. Woo and S. S. Lam. A lesson on authentication protocol design. Operation Systems Review, 28(3):24-37, 1994.
    • (1994) Operation Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.