메뉴 건너뛰기




Volumn 2996, Issue , 2004, Pages 382-393

Automata-based analysis of recursive cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; COMPUTABILITY AND DECIDABILITY; CRYPTOGRAPHY;

EID: 35048832860     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24749-4_34     Document Type: Article
Times cited : (19)

References (25)
  • 1
    • 0038504807 scopus 로고    scopus 로고
    • XML with Data Values: Typechecking Revisited
    • N. Alon, T. Milo, F. Neven, D. Suciu, and V. Vianu. XML with Data Values: Typechecking Revisited. In JCSS 66(4): 688-727 (2003).
    • (2003) JCSS , vol.66 , Issue.4 , pp. 688-727
    • Alon, N.1    Milo, T.2    Neven, F.3    Suciu, D.4    Vianu, V.5
  • 2
    • 1442267744 scopus 로고    scopus 로고
    • On Name Generation and Set-Based Analysis in the Dolev-Yao Model
    • R.M. Amadio and W. Charatonik. On Name Generation and Set-Based Analysis in the Dolev-Yao Model. In CONCUR 2002.
    • (2002) CONCUR
    • Amadio, R.M.1    Charatonik, W.2
  • 3
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002.
    • (2002) Theoretical Computer Science , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.M.1    Lugiez, D.2    Vanackere, V.3
  • 4
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM
    • M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. In STOC'95, pages 57-66. ACM, 1995.
    • (1995) STOC'95 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Springer
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In ICALP 2001, pages 667-681. Springer, 2001.
    • (2001) ICALP 2001 , pp. 667-681
    • Boreale, M.1
  • 9
    • 18544387122 scopus 로고    scopus 로고
    • Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In FSTTCS 2003.
    • (2003) FSTTCS
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 12
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003.
    • (2003) LICS
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 14
    • 0005240447 scopus 로고    scopus 로고
    • A Cryptographic Evaluation of IPsec
    • Available from
    • N. Ferguson and B. Schneier. A Cryptographic Evaluation of IPsec. Technical report, 2000. Available from http://www.counterpane.com/ipsec.pdf.
    • (2000) Technical Report
    • Ferguson, N.1    Schneier, B.2
  • 15
    • 84874721799 scopus 로고    scopus 로고
    • On the decidability of cryptographic protocols with open-ended data structures
    • CONCUR SOUS, Springer
    • R. Küsters. On the decidability of cryptographic protocols with open-ended data structures. In CONCUR SOUS, LNCS 2421, pages 515-530. Springer, 2002.
    • (2002) LNCS , vol.2421 , pp. 515-530
    • Küsters, R.1
  • 16
    • 27344454831 scopus 로고    scopus 로고
    • Automata-based Analysis of Recursive Cryptographic Protocols
    • CAU Kiel, Available from
    • R. Küsters and Th. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. Technical Report IFI 0311, CAU Kiel, 2003. Available from http://www.informatik.uni-kiel.de/reports/2003/0311.html
    • (2003) Technical Report IFI 0311
    • Küsters, R.1    Wilke, Th.2
  • 17
    • 35048888529 scopus 로고    scopus 로고
    • Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
    • C. Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In WITS 2000.
    • (2000) WITS
    • Meadows, C.1
  • 18
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press
    • C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
    • (2000) DISCEX , vol.2000 , pp. 237-250
    • Meadows, C.1
  • 19
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
    • (2001) CCS , vol.2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 20
    • 84974693396 scopus 로고    scopus 로고
    • Towards regular languages over infinite alphabets
    • MFCS 2001, Springer
    • F. Neven, Th. Schwentick, and V. Vianu. Towards regular languages over infinite alphabets. In MFCS 2001, LNCS 2136, pages 560-572. Springer, 2001.
    • (2001) LNCS , vol.2136 , pp. 560-572
    • Neven, F.1    Schwentick, Th.2    Vianu, V.3
  • 21
    • 0030696539 scopus 로고    scopus 로고
    • Mechanized Proofs for a Recursive Authentication Protocol
    • IEEE Computer Society Press
    • L.C. Paulson. Mechanized Proofs for a Recursive Authentication Protocol. In CSFW-10, pages 84-95. IEEE Computer Society Press, 1997.
    • (1997) CSFW-10 , pp. 84-95
    • Paulson, L.C.1
  • 22
    • 0034822650 scopus 로고    scopus 로고
    • A Security Analysis of the Cliques Protocols Suites
    • IEEE Computer Society Press
    • O. Pereira and J.-J. Quisquater. A Security Analysis of the Cliques Protocols Suites. In CSFW-14, pages 73-81. IEEE Computer Society Press, 2001.
    • (2001) CSFW-14 , pp. 73-81
    • Pereira, O.1    Quisquater, J.-J.2
  • 23
    • 0034822801 scopus 로고    scopus 로고
    • Protocol Insecurity with Finite Number of Sessions is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. In CSFW-14, pages 174-190. 2001.
    • (2001) CSFW-14 , pp. 174-190
    • Rusinowitch, M.1    Turuani, M.2
  • 24
    • 0028523063 scopus 로고
    • Haskell overloading is DEXPTIME-complete
    • H. Seidl. Haskell overloading is DEXPTIME-complete. Information Processing Letters, 52(2), 1994.
    • (1994) Information Processing Letters , vol.52 , Issue.2
    • Seidl, H.1
  • 25
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • J. Zhou. Fixing a security flaw in IKE protocols. Electronic Letter, 35(13):10721073, 1999.
    • (1999) Electronic Letter , vol.35 , Issue.13 , pp. 10721073
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.