메뉴 건너뛰기




Volumn 2988, Issue , 2004, Pages 342-356

Automatic Verification of Time Sensitive Cryptographic Protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 35048864876     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24730-2_27     Document Type: Article
Times cited : (34)

References (20)
  • 1
    • 19144369108 scopus 로고
    • Programming Satan's computer. Computer Science Today: 426-440
    • R. Anderson, and R. Needham. Programming Satan's computer. Computer Science Today: 426-440, LNCS 1000, 1995.
    • (1995) LNCS , vol.1000
    • Anderson, R.1    Needham, R.2
  • 2
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • G. Bella and L. C. Paulson. Kerberos version IV: inductive analysis of the secrecy goals. ESORICS '98: 361-375, 1998.
    • (1998) ESORICS '98 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. CSFW '01: 82-96, 2001.
    • (2001) CSFW '01 , pp. 82-96
    • Blanchet, B.1
  • 5
    • 84888233924 scopus 로고    scopus 로고
    • Beyond Parameterized Verification
    • M. Bozzano and G. Delzanno. Beyond Parameterized Verification. TACAS '02, LNCS 2280: 221-235, 2002.
    • (2002) TACAS '02, LNCS , vol.2280 , pp. 221-235
    • Bozzano, M.1    Delzanno, G.2
  • 6
    • 1442316806 scopus 로고    scopus 로고
    • Pattern-based Abstraction for Verifying Secrecy in Protocols
    • L. Bozga, Y. Lakhnech, and M. Périn. Pattern-based Abstraction for Verifying Secrecy in Protocols. TACAS '03, LNCS 2619: 299-314, 2003.
    • (2003) TACAS '03, LNCS , vol.2619 , pp. 299-314
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 8
    • 0033718532 scopus 로고    scopus 로고
    • A First-Order Verifier for Cryptographic Protocols
    • E. Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. CSFW '00: 144-158, 2000.
    • (2000) CSFW '00 , pp. 144-158
    • Cohen Taps, E.1
  • 9
    • 84944070422 scopus 로고    scopus 로고
    • Analysing Time Dependent Security Properties in CSP Using PVS
    • N. Evans and S. Schneider. Analysing Time Dependent Security Properties in CSP Using PVS. ESORICS '00, LNCS 1895: 222-237, 2000.
    • (2000) ESORICS '00, LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 10
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for Cryptographic Protocol Verification
    • T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. CADE '00, LNCS 1831: 271-290, 2000.
    • (2000) CADE '00, LNCS , vol.1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 11
    • 20144369157 scopus 로고    scopus 로고
    • A Family of Attacks upon Authentication Protocols
    • University of Leicester
    • G. Lowe. A Family of Attacks upon Authentication Protocols. Technical Report 1997/5, University of Leicester, 1997.
    • (1997) Technical Report 1997/5
    • Lowe, G.1
  • 12
    • 0030708255 scopus 로고    scopus 로고
    • A Hierarchy of Authentication Specifications
    • G. Lowe. A Hierarchy of Authentication Specifications. CSFW '97: 31-44, 1997.
    • (1997) CSFW '97 , pp. 31-44
    • Lowe, G.1
  • 13
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. CSFW '97: 18-30, 1997.
    • (1997) CSFW ' , vol.97 , pp. 18-30
    • Lowe, G.1
  • 14
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe. Towards a completeness result for model checking of security protocols. J. of Computer Security, 7(2-3):89-146, 1998.
    • (1998) J. of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. J. of Logic Programming, 26(2):113-131, 1996.
    • (1996) J. of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. CCS '01: 166-175, 2001.
    • (2001) CCS '01 , pp. 166-175
    • Millen, J.1    Shmatikov, V.2
  • 18
    • 0033344294 scopus 로고    scopus 로고
    • Proving Security Protocols with Model Checkers by Data Independence Techniques
    • A. W. Roscoe and P. J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. J. of Computer Security, 7(2,3):147-190, 1999.
    • (1999) J. of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 19
    • 0032678887 scopus 로고    scopus 로고
    • A New Efficient Automatic Checker for Security Protocol Analysis
    • D. X. Song. Athena. A New Efficient Automatic Checker for Security Protocol Analysis. CSFW '99: 192-202, 1999.
    • (1999) CSFW '99 , pp. 192-202
    • Song Athena, D.X.1
  • 20
    • 35048818908 scopus 로고    scopus 로고
    • The MSR(C) home page
    • The MSR(C) home page: http://www.disi.unige.it/person/DelzannoG/MSR/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.