메뉴 건너뛰기




Volumn 2919, Issue , 2004, Pages 257-271

Abstraction-driven SAT-based analysis of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; FORMAL LOGIC; NETWORK SECURITY;

EID: 35048841165     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24605-3_20     Document Type: Article
Times cited : (17)

References (31)
  • 1
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • L. Carlucci Aiello and F. Massacci. Verifying security protocols as planning in logic programming. ACM Trans, on Computational Logic, 2(4):542-580, 2001.
    • (2001) ACM Trans, on Computational Logic , vol.2 , Issue.4 , pp. 542-580
    • Carlucci Aiello, L.1    Massacci, F.2
  • 5
    • 0009956081 scopus 로고    scopus 로고
    • Maude versus haskell: An experimental comparison in security protocol analysis
    • Kokichi Futatsugi, editor, Elsevier Science Publishers
    • David Basin and Grit Denker. Maude versus haskell: an experimental comparison in security protocol analysis. In Kokichi Futatsugi, editor, Electronic Notes in Theoretical Computer Science, volume 36. Elsevier Science Publishers, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.36
    • Basin, D.1    Denker, G.2
  • 13
    • 0027708548 scopus 로고
    • Experimental results on the crossover point in satisfiability problems
    • Richard Fikes and Wendy Lehnert, editors, California, AAAI Press
    • James M. Crawford and L. D. Anton. Experimental results on the crossover point in satisfiability problems. In Richard Fikes and Wendy Lehnert, editors, Proceedings of the 11th AAAI Conference, pages 21-27, California, 1993. AAAI Press.
    • (1993) Proceedings of the 11th AAAI Conference , pp. 21-27
    • Crawford, J.M.1    Anton, L.D.2
  • 14
    • 0003902378 scopus 로고    scopus 로고
    • The CAPSL Integrated Protocol Environment
    • SRI International, Menlo Park, CA, October
    • Grit Denker, Jonathan Millen, and Harald Rueß. The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-02, SRI International, Menlo Park, CA, October 2000. Available at http://www.csl.sri.com/~millen/capsl/ .
    • (2000) Technical Report , vol.SRI-CSL-2000-02
    • Denker, G.1    Millen, J.2    Rueß, H.3
  • 18
    • 84867787499 scopus 로고    scopus 로고
    • Evaluating search heuristics and optimization techniques in propositional satisfiability
    • Springer-Verlag
    • E. Giunchiglia, M. Maratea, A. Tacchella, and D. Zambonin. Evaluating search heuristics and optimization techniques in propositional satisfiability. In Proceedings of IJCAR'2001, pages 347-363. Springer-Verlag, 2001.
    • (2001) Proceedings of IJCAR'2001 , pp. 347-363
    • Giunchiglia, E.1    Maratea, M.2    Tacchella, A.3    Zambonin, D.4
  • 20
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and Verifying Security Protocols
    • M. Parigot and A. Voronkov, editors, LNCS 1955, Springer-Verlag, Heidelberg
    • Florent Jacquemard, Michael Rusinowitch, and Laurent Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, Heidelberg, 2000.
    • (2000) Proceedings of LPAR 2000 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 22
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Shroeder public-key protocol using FDR
    • Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Shroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 147-166. Springer-Verlag, 1996.
    • (1996) Proceedings of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 23
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Gawin Lowe. Casper: a compiler for the analysis of security protocols. Journal of Computer Security, 6(1):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 25
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 28
    • 14044269417 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June
    • R. M. (Roger Michael) Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Technical Report CSL-78-4, Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June 1982.
    • (1982) Technical Report , vol.CSL-78-4
    • Needham, R.M.1    Schroeder, M.D.2
  • 29
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.C.1
  • 31
    • 84937410369 scopus 로고    scopus 로고
    • SATO: An efficient propositional prover
    • William McCune, editor, LNAI 1249, Springer-Verlag
    • H. Zhang. SATO: An efficient propositional prover. In William McCune, editor, Proceedings of CADE 14, LNAI 1249, pages 272-275. Springer-Verlag, 1997.
    • (1997) Proceedings of CADE , vol.14 , pp. 272-275
    • Zhang, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.