메뉴 건너뛰기




Volumn 2747, Issue , 2003, Pages 46-67

Process algebraic frameworks for the specification and analysis of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; CRYPTOGRAPHY;

EID: 35048903801     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45138-9_3     Document Type: Article
Times cited : (2)

References (36)
  • 1
    • 84937720349 scopus 로고    scopus 로고
    • Security, protocols and specifications
    • Proc. Foundations of Software Science and Computation Structures
    • M. Abadi. Security, protocols and specifications. In Proc. Foundations of Software Science and Computation Structures, volume 1578 of LNCS, pages 1-13, 1999.
    • (1999) LNCS , vol.1578 , pp. 1-13
    • Abadi, M.1
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Automata, Languages and Programming
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Automata, Languages and Programming, LNCS, pages 667-681, 2001.
    • (2001) LNCS , pp. 667-681
    • Boreale, M.1
  • 12
    • 35048902864 scopus 로고    scopus 로고
    • Cvs at work: A report on new failures upon some cryptographic protocols
    • Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security
    • A. Durante, R. Focardi, and R. Gorrieri. Cvs at work: A report on new failures upon some cryptographic protocols. In Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS 2052, 2001.
    • (2001) LNCS , vol.2052
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 14
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part i: Information flow)
    • Foundations of Security Analysis and Design
    • R. Focardi and R. Gorrieri. Classification of security properties (part i: Information flow). In Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396, 2001.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • Proceedings of 27th International Colloquium in Automata, Languages and Programming
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of 27th International Colloquium in Automata, Languages and Programming, volume 1853 of LNCS, pages 354-372, 2000.
    • (2000) LNCS , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 17
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proceedings of World Congress on Formal Methods (FM'99)
    • R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), volume 1708 of LNCS, pages 794-813, 1999.
    • (1999) LNCS , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 20
    • 23044531604 scopus 로고    scopus 로고
    • Notes on nominal calculi for security and mobility
    • Foundations of Security Analysis and Design
    • A. D. Gordon. Notes on nominal calculi for security and mobility. In Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 262-330, 2001.
    • (2001) LNCS , vol.2171 , pp. 262-330
    • Gordon, A.D.1
  • 22
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham Schroeder public-key protocol using FDR
    • Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, Springer Verlag
    • G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 23
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 24
    • 84956982499 scopus 로고    scopus 로고
    • Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems
    • Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02)
    • F. Martinelli. Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems. In Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02), volume 2420 of LNCS, pages 519-531.
    • LNCS , vol.2420 , pp. 519-531
    • Martinelli, F.1
  • 26
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science, 290(1):1057-1106, 2003.
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 1057-1106
    • Martinelli, F.1
  • 27
    • 35248833600 scopus 로고    scopus 로고
    • Symbolic partial model checking for security analysis
    • Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, To appear
    • F. Martinelli. Symbolic partial model checking for security analysis. In Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS, 2003. To appear.
    • (2003) LNCS
    • Martinelli, F.1
  • 28
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • J. Rieley and Matthew Hennessy. Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. on Progr. Lang, and Systems (TOPLAS), 24(5):566-591, 2002.
    • (2002) ACM Trans. on Progr. Lang, and Systems (TOPLAS) , vol.24 , Issue.5 , pp. 566-591
    • Rieley, J.1    Hennessy, M.2
  • 31
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroder, M.D.2
  • 32
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A. Roscoe and P. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7(2-3):147-190, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.1    Broadfoot, P.2
  • 34
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer-Verlag
    • P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171
    • Samarati, P.1    Di Vimercati, S.D.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.