메뉴 건너뛰기




Volumn 4424 LNCS, Issue , 2007, Pages 523-537

Searching for shapes in cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; SEARCH ENGINES; ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35048899619     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71209-1_41     Document Type: Conference Paper
Times cited : (60)

References (21)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • January
    • Martín Abadi and Bruno Blanchet. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM, 52(1):102-146, January 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 84885216561 scopus 로고
    • On the reachability problem in cryptographic protocols
    • Concur, number
    • Roberto M. Amadio and Denis Lugiez. On the reachability problem in cryptographic protocols. In Concur, number 1877 in LNCS, pages 380-394, 2000.
    • (1877) LNCS , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 4
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Foundations of Software Science and Computation Structures, April
    • Bruno Blanchet and Andreas Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Foundations of Software Science and Computation Structures, LNCS, pages 136-152, April 2003.
    • (2003) LNCS , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 5
    • 33750241298 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key exchange protocols
    • March
    • Ran Canetti and Jonathan Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proceedings, Theory of Cryptography Conference (TCC), March 2006.
    • (2006) Proceedings, Theory of Cryptography Conference (TCC)
    • Canetti, R.1    Herzog, J.2
  • 6
    • 37148999718 scopus 로고    scopus 로고
    • Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Searching for shapes in cryptographic protocols (extended version). URL:http://eprint.iacr. org/2006/435, November 2006.
    • Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Searching for shapes in cryptographic protocols (extended version). URL:http://eprint.iacr. org/2006/435, November 2006.
  • 8
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.1    Lincoln, P.2    Mitchell, J.3    Scedrov, A.4
  • 9
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • Andrew D. Gordon and Alan Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
    • (2003) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 10
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • June
    • Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, June 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Javier Thayer, F.2
  • 11
    • 37149020169 scopus 로고    scopus 로고
    • Conference version appeared in IEEE Symposium on Security and Privacy, May 2000.
    • Conference version appeared in IEEE Symposium on Security and Privacy, May 2000.
  • 12
    • 12144271120 scopus 로고    scopus 로고
    • The Diffie-Hellman key-agreement scheme in the strandspace model
    • Asilomar, CA, June, IEEE CS Press
    • Jonathan C. Herzog. The Diffie-Hellman key-agreement scheme in the strandspace model. In 16th Computer Security Foundations Workshop, pages 234-247, Asilomar, CA, June 2003. IEEE CS Press.
    • (2003) 16th Computer Security Foundations Workshop , pp. 234-247
    • Herzog, J.C.1
  • 13
    • 37149004909 scopus 로고    scopus 로고
    • ITU. Message sequence chart (MSC). Recommendation Z.120, 1999.
    • ITU. Message sequence chart (MSC). Recommendation Z.120, 1999.
  • 14
    • 0017996760 scopus 로고
    • Time, clocks and the ordering of events in a distributed system
    • Leslie Lamport. Time, clocks and the ordering of events in a distributed system. CACM, 21(7):558-565, 1978.
    • (1978) CACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 15
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceeedings of TACAS, of, Springer Verlag
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceeedings of TACAS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 18
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • Lawrence C. Paulson. Relations between secrets: Two formal analyses of the Yahalom protocol. Journal of Computer Security, 2001.
    • (2001) Journal of Computer Security
    • Paulson, L.C.1
  • 19
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society Press, July
    • Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000.
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Xiaodong Song, D.2
  • 20
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • R. Ramanujam and S. P. Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1): 135-166, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-166
    • Ramanujam, R.1    Suresh, S.P.2
  • 21
    • 37149050209 scopus 로고    scopus 로고
    • Preliminary version appeared in WITS '03, Workshop on Issues in the Theory of Security, Warsaw, April 2003.
    • Preliminary version appeared in WITS '03, Workshop on Issues in the Theory of Security, Warsaw, April 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.