메뉴 건너뛰기




Volumn 3142, Issue , 2004, Pages 46-58

Deciding knowledge in security protocols under equational theories

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; CRYPTOGRAPHY; POLYNOMIAL APPROXIMATION;

EID: 35048822401     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27836-8_7     Document Type: Article
Times cited : (38)

References (21)
  • 3
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • Winter
    • M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5(4):267-303, Winter 1998.
    • (1998) Nordic Journal of Computing , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • C. Palamidessi, editor, CONCUR 2000: Concurrency Theory (11th Int. Conference), Springer Verlag, Aug.
    • R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In C. Palamidessi, editor, CONCUR 2000: Concurrency Theory (11th Int. Conference), volume 1877 of LNCS, pages 380-394. Springer Verlag, Aug. 2000.
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 7
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symposium (SAS'02), Springer Verlag, Sept.
    • B. Blanchet. From secrecy to authenticity in security protocols. In M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer Verlag, Sept. 2002.
    • (2002) LNCS , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 8
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • May to appear
    • B. Blanchet. Automatic proof of strong secrecy for security protocols. In IEEE Symposium on Security and Privacy, May 2004, to appear.
    • (2004) IEEE Symposium on Security and Privacy
    • Blanchet, B.1
  • 10
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • P. K. Pandya and J. Radhakrishnan, editors, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Springer Verlag
    • Y. Chevalier, R. Kuester, M. Rusinowitch, and M. Turani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In P. K. Pandya and J. Radhakrishnan, editors, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, volume 2914 of LNCS, pages 124-135. Springer Verlag, 2003.
    • (2003) LNCS , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Kuester, R.2    Rusinowitch, M.3    Turani, M.4
  • 13
    • 28144461037 scopus 로고    scopus 로고
    • Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France
    • H. Comon-Lundh and R. Treinen. Easy intruder deductions. Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, 2003.
    • (2003) Easy Intruder Deductions
    • Comon-Lundh, H.1    Treinen, R.2
  • 15
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12): 198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 17
    • 0028385109 scopus 로고
    • Three system for cryptographic protocol analysis
    • Spring
    • R. Kemmerer, C. Meadows, and J. Millen. Three system for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, Spring 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, Springer Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.