메뉴 건너뛰기




Volumn , Issue , 2007, Pages 370-384

The insecurity problem: Tackling unbounded data

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; DATA REDUCTION; SECURITY OF DATA;

EID: 35048864875     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.32     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Springer-Verlag
    • R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In CONCUR '00, pages 380-394. Springer-Verlag, 2000.
    • (2000) CONCUR '00 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 2
    • 26944465513 scopus 로고    scopus 로고
    • Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
    • Springer-Verlag
    • Y Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, and L. Vigneron. Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In CSL'03, pages 128-141. Springer-Verlag, 2003.
    • (2003) CSL'03 , pp. 128-141
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4    Vigneron, L.5
  • 3
    • 15744388991 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and cryptographic protocols
    • H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theor. Comput. Sci., 331(1):143-214, 2005.
    • (2005) Theor. Comput. Sci , vol.331 , Issue.1 , pp. 143-214
    • Comon, H.1    Cortier, V.2
  • 5
    • 0020190170 scopus 로고
    • On the security of pingpong protocols
    • S. Dolev, S. Even, and R. M. Karp. On the security of pingpong protocols. Inform. and Control, 55(1-3):57-68, 1982.
    • (1982) Inform. and Control , vol.55 , Issue.1-3 , pp. 57-68
    • Dolev, S.1    Even, S.2    Karp, R.M.3
  • 6
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Multiset rewriting and the complexity of bounded security protocols. J. of Computer Security, 12(2):247-311, 2004.
    • (2004) J. of Computer Security , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.1    Lincoln, P.2    Mitchell, J.3    Scedrov, A.4
  • 9
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett., 56(3):131-133, 1995.
    • (1995) Inf. Process. Lett , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 10
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 11
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • IEEE Computer Society
    • M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions is NP-complete. In CSFW '01, pages 174-187. IEEE Computer Society, 2001.
    • (2001) CSFW '01 , pp. 174-187
    • Rusinowitch, M.1    Turuani, M.2
  • 12
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • IEEE Computer Society
    • D. X. Song. Athena: A new efficient automatic checker for security protocol analysis. In CSFW'99, pages 192-202. IEEE Computer Society, 1999.
    • (1999) CSFW'99 , pp. 192-202
    • Song, D.X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.