메뉴 건너뛰기




Volumn 2987, Issue , 2004, Pages 42-57

On the Existence of an Effective and Complete Inference System for Cryptographic Protocols (Extended Abstract)

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTATION THEORY; CRYPTOGRAPHY; FORMAL LOGIC; SEMANTICS;

EID: 35048883478     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24727-2_5     Document Type: Article
Times cited : (1)

References (21)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • LNCS
    • R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In International Conference on Concurrency Theory, volume 1877 of LNCS, pages 380-394, 2000.
    • (2000) International Conference on Concurrency Theory , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 2
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Andrew D. Gordon, editor, LNCS, Springer
    • B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew D. Gordon, editor, FoSSaCS'03: Foundations of Software Science and Computation Structures, volume 2620 of LNCS, pages 136152. Springer, 2003.
    • (2003) FoSSaCS'03: Foundations of Software Science and Computation Structures , vol.2620 , pp. 136152
    • Blanchet, B.1    Podelski, A.2
  • 4
    • 35048855590 scopus 로고    scopus 로고
    • Abstract interpretation for secrecy using patterns
    • LNCS
    • L. Bozga, Y. Lakhnech, and M. Périn. Abstract interpretation for secrecy using patterns. In TACAS'03, volume 2619 of LNCS, 2003.
    • (2003) TACAS'03 , vol.2619
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 8
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of firstorder logic and application to cryptographic protocols
    • LNCS
    • H. Comon-Lundh and V. Cortier. New decidability results for fragments of firstorder logic and application to cryptographic protocols. In 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS, 2003.
    • (2003) 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003) , vol.2706
    • Comon-Lundh, H.1    Cortier, V.2
  • 12
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • Washington - Brussels - Tokyo, June IEEE.
    • M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 160-173, Washington - Brussels - Tokyo, June 2001. IEEE.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW '01) , pp. 160-173
    • Fiore, M.1    Abadi, M.2
  • 13
    • 0002692684 scopus 로고
    • Solving equations in abstract algebras: A rulebased survey of unification
    • Jean-Louis Lassez and Gordon Plotkin, editors, MIT-Press
    • J.-P. Jouannaud and C. Kirchner. Solving equations in abstract algebras: A rulebased survey of unification. In Jean-Louis Lassez and Gordon Plotkin, editors, Computational Logic: Essays in Honor of Alan Robinson. MIT-Press, 1991.
    • (1991) Computational Logic: Essays in Honor of Alan Robinson.
    • Jouannaud, J.-P.1    Kirchner, C.2
  • 14
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • Washington - Brussels - Tokyo, June IEEE
    • G. Lowe. A hierarchy of authentication specifications. In 10th IEEE Computer Security Foundations Workshop (CSFW '97), pages 31-44, Washington - Brussels - Tokyo, June 1997. IEEE.
    • (1997) 10th IEEE Computer Security Foundations Workshop (CSFW '97) , pp. 31-44
    • Lowe, G.1
  • 15
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • January
    • C. Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communication, 21(l):44-54, January 2003.
    • (2003) IEEE Journal on Selected Areas in Communication , vol.21 , Issue.50 , pp. 44-54
    • Meadows, C.1
  • 17
    • 0029713842 scopus 로고    scopus 로고
    • Intensional specification of security protocols
    • Washington Brussels - Tokyo, June IEEE
    • A. W. Roscoe. Intensional specification of security protocols. In 9th IEEE Computer Security Foundations Workshop (CSFW '96), pages 28-38, Washington Brussels - Tokyo, June 1996. IEEE.
    • (1996) 9th IEEE Computer Security Foundations Workshop (CSFW '96) , pp. 28-38
    • Roscoe, A.W.1
  • 19
    • 0030684956 scopus 로고    scopus 로고
    • Verifying authentication protocols with CSP
    • Washington - Brussels Tokyo, June IEEE
    • S. Schneider. Verifying authentication protocols with CSP. In 10th IEEE Computer Security Foundations Workshop (CSFW '97), pages 3-17, Washington - Brussels Tokyo, June 1997. IEEE.
    • (1997) 10th IEEE Computer Security Foundations Workshop (CSFW '97) , pp. 3-17
    • Schneider, S.1
  • 21
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • January
    • Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems. Computer, 25(l):39-52, January 1992.
    • (1992) Computer , vol.25 , Issue.50 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.