메뉴 건너뛰기




Volumn 2845, Issue , 2003, Pages 34-46

A structured operational modelling of the Dolev-Yao threat model

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS; SYSTEMS ENGINEERING;

EID: 35048833887     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (2)

References (11)
  • 3
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • August
    • D. Denning and G. Sacco. Timestamps in key distribution protocols, Communications of the ACM, vol 24, no 8, pp. 533-536, August 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 6
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • C.A.R. Hoare. Communicating sequential processes, Communications of the ACM, 21(8), 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.8
    • Hoare, C.A.R.1
  • 7
    • 0003843704 scopus 로고
    • Communicating Sequential Processes
    • Prentice Hall International
    • C.A.R. Hoare. Communicating Sequential Processes, Series in Computer Science, Prentice Hall International, 1985.
    • (1985) Series in Computer Science
    • Hoare, C.A.R.1
  • 8
    • 17744389736 scopus 로고    scopus 로고
    • Ph.D. Thesis, CMU-CS-01-170, School of Computer Science, Carnegie Mellon University, December
    • W. Marrero. BRUTUS: A Model Checker for Security Protocols, Ph.D. Thesis, CMU-CS-01-170, School of Computer Science, Carnegie Mellon University, December 2001.
    • (2001) BRUTUS: A Model Checker for Security Protocols
    • Marrero, W.1
  • 10
    • 0003954103 scopus 로고
    • Communication and Concurrency
    • Prentice Hall International
    • R. Milner. Communication and Concurrency, Series in Computer Science, Prentice Hall International, 1989.
    • (1989) Series in Computer Science
    • Milner, R.1
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers, Communications of the ACM, vol. 21, no 12, pp. 993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.