메뉴 건너뛰기




Volumn , Issue , 2007, Pages 385-396

LTL model checking for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 35048868416     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.24     Document Type: Conference Paper
Times cited : (45)

References (20)
  • 1
    • 84982909952 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. In LICS, pages 105-116, 1998.
    • (1998) LICS , pp. 105-116
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 5
    • 84961379291 scopus 로고
    • Lazy infinite-state analysis of security protocols
    • R. Baumgart, editor, Secure Networking -CQRE (Secure)'99, Springer-Verlag
    • D. Basin. Lazy infinite-state analysis of security protocols. In R. Baumgart, editor, Secure Networking -CQRE (Secure)'99, LNCS 1740, pages 30-42. Springer-Verlag, 1999.
    • (1740) LNCS , pp. 30-42
    • Basin, D.1
  • 6
    • 33646262130 scopus 로고    scopus 로고
    • Algebraic intruder deductions
    • G. Sutcliffe and A. Voronkov, editors, Springer
    • D. Basin, S. Mödersheim, and L. Viganò. Algebraic intruder deductions. In G. Sutcliffe and A. Voronkov, editors, Proceedings of LPAR'05, LNAI3835, pages 549-564. Springer, 2005.
    • (2005) Proceedings of LPAR'05, LNAI3835 , pp. 549-564
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 7
    • 84944319371 scopus 로고    scopus 로고
    • Symbolic Model Checking without BDDs
    • Proceedings of TACAS'99, Springer-Verlag
    • A. Biere, A. Cimatti, E. Clarke, and Y. Zhu. Symbolic Model Checking without BDDs. In Proceedings of TACAS'99, LNCS 1579, pages 193-207. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1579 , pp. 193-207
    • Biere, A.1    Cimatti, A.2    Clarke, E.3    Zhu, Y.4
  • 10
    • 35048851469 scopus 로고    scopus 로고
    • J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL
    • J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL: www.cs. york.ac.uk/~jac/papers/drareview.ps.gz.
  • 11
    • 24944569389 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • J. Giesl, editor, Proceedings of the 16th International Conference on Rewriting Techniques and Applications RTA '05, of, Nara, Japan, Apr, Springer
    • H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In J. Giesl, editor, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA '05), volume 3467 of Lecture Notes in Computer Science, pages 294-307, Nara, Japan, Apr. 2005. Springer.
    • (2005) Lecture Notes in Computer Science , vol.3467 , pp. 294-307
    • Comon-Lundh, H.1    Delaune, S.2
  • 15
    • 84956860311 scopus 로고
    • Compiling and Verifying Security Protocols
    • M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, Springer-Verlag
    • F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, 2000.
    • (1955) LNCS , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 16
    • 0030232808 scopus 로고    scopus 로고
    • A calculus for security bootstrapping in distributed systems
    • U. Maurer and P. Schmid. A calculus for security bootstrapping in distributed systems. Journal of Computer Security, 4(1):55-80, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.1 , pp. 55-80
    • Maurer, U.1    Schmid, P.2
  • 17
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • 113-131, See http
    • C. Meadows. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming, 26(2):113-131, 1996. See http://chacs.nrl.navy.mil/projects/ crypto.html.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2
    • Meadows, C.1
  • 19
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • IEEE Computer Society Press, June
    • J. Raskin and S. Kremer. Game analysis of abuse-free contract signing. In 15th IEEE Computer Security Foundations Workshop, pages 206-220. IEEE Computer Society Press, June 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 206-220
    • Raskin, J.1    Kremer, S.2
  • 20
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J. C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.