메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 417-440

A logical verification method for security protocols based on linear logic and BAN logic

Author keywords

[No Author keywords available]

Indexed keywords

LINEAR ALGEBRA; SEMANTICS; SYNTACTICS;

EID: 35048859061     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_24     Document Type: Article
Times cited : (2)

References (16)
  • 1
    • 84958778419 scopus 로고
    • On a Limitation of BAN Logic
    • Eurocrypt '93, edited by T. Helleseth
    • C. Boyd and W. Mao. On a Limitation of BAN Logic. LNCS Vol. 765, Eurocrypt '93, edited by T. Helleseth, pp. 240-247, 1993.
    • (1993) LNCS , vol.765 , pp. 240-247
    • Boyd, C.1    Mao, W.2
  • 3
    • 84948759231 scopus 로고    scopus 로고
    • A formal analysis of some properties of Kerberos 5 using MSR
    • S. Schneider, ed., Cape Breton, Nova Scotia, Canada, June, 2002, IEEE Computer Society Press
    • F. Butler, I. Cervesato, A. Jaggard, and A. Scedrov. A formal analysis of some properties of Kerberos 5 using MSR. In: S. Schneider, ed., 15-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2002, IEEE Computer Society Press, 2002, pp. 175-190.
    • (2002) 15-th IEEE Computer Security Foundations Workshop , pp. 175-190
    • Butler, F.1    Cervesato, I.2    Jaggard, A.3    Scedrov, A.4
  • 7
    • 0034834930 scopus 로고    scopus 로고
    • A Compositional Logic for Protocol Correctness
    • S. Schneider, ed., Cape Breton, Nova Scotia, Canada, June, 2001, IEEE Computer Society Press
    • N. Durgin, J. Mitchell, and D. Pavlovic. A Compositional Logic for Protocol Correctness. In: S. Schneider, ed., 14-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2001, IEEE Computer Society Press, 2001.
    • (2001) 14-th IEEE Computer Security Foundations Workshop
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 10
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public Key Authentication Protocol
    • G. Lowe. An Attack on the Needham-Schroeder Public Key Authentication Protocol. Information Processing Letters, 56 (3), pp. 131-136, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM pp. 993-999, 1978.
    • (1978) Communications of the ACM , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 13
    • 84944136317 scopus 로고    scopus 로고
    • Logical Verifications for Security Protocols Based on Linear Logic
    • M. Okada and K. Hasebe Logical Verifications for Security Protocols Based on Linear Logic. (in Japanese) Technical report of IEICE, 102(91), pp. 49-54, 2002.
    • (2002) Technical Report of IEICE , vol.102 , Issue.91 , pp. 49-54
    • Okada, M.1    Hasebe, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.