메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 263-282

Typing one-to-one and one-to-many correspondences in security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS;

EID: 35248815623     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_17     Document Type: Article
Times cited : (16)

References (32)
  • 1
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Foundations of Software Science and Computation Structures, Springer
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Foundations of Software Science and Computation Structures, volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, Springer
    • R. Anderson and R. Needham. Programming Satan's computer. In J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, volume 1000 of Lecture Notes in Computer Science, pages 426-440. Springer, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 9
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • 9th International Static Analysis Symposium (SAS'02), Springer
    • B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes in Computer Science, pages 242-259. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 242-259
    • Blanchet, B.1
  • 10
    • 84955619856 scopus 로고    scopus 로고
    • Typed MSR: Syntax and examples
    • First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Springer
    • I. Cervesato. Typed MSR: Syntax and examples. In First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, volume 2052 of Lecture Notes in Computer Science, pages 159-177. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2052 , pp. 159-177
    • Cervesato, I.1
  • 13
    • 0030574543 scopus 로고    scopus 로고
    • A multiset semantics for the pi-calculus with replication
    • J. Engelfriet. A multiset semantics for the pi-calculus with replication. Theoretical Computer Science, 153:65-94, 1996.
    • (1996) Theoretical Computer Science , vol.153 , pp. 65-94
    • Engelfriet, J.1
  • 14
    • 84974776068 scopus 로고
    • A classification of security properties for process algebra
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebra. Journal of Computer Security, 3(1):5-33, 1994.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 26844480899 scopus 로고    scopus 로고
    • Message authentication through non-interference
    • International Conference on Algebraic Methodology And Software Technology (AMAST2000), Springer
    • R. Focardi, R. Gorrieri, and F. Martinelli. Message authentication through non-interference. In International Conference on Algebraic Methodology And Software Technology (AMAST2000), volume 1816 of Lecture Notes in Computer Science, pages 258-272. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1816 , pp. 258-272
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 16
  • 17
    • 0141658120 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • Mathematical Foundations of Programming Semantics 17, Elsevier
    • A.D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. In Mathematical Foundations of Programming Semantics 17, volume 45 of Electronic Notes in Theoretical Computer Science. Elsevier, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.45
    • Gordon, A.D.1    Jeffrey, A.2
  • 18
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • IEEE Computer Society Press
    • A.D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop, pages 77-91. IEEE Computer Society Press, 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 77-91
    • Gordon, A.D.1    Jeffrey, A.2
  • 21
    • 3042597797 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • To appear
    • A.D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security, 2002. To appear.
    • (2002) ACM Workshop on XML Security
    • Gordon, A.D.1    Pucella, R.2
  • 22
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J.D. Guttman and F. J. Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 24
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press
    • G. Lowe. A hierarchy of authentication specifications. In 10th IEEE Computer Security Foundations Workshop, pages 31-43. IEEE Computer Society Press, 1997.
    • (1997) 10th IEEE Computer Security Foundations Workshop , pp. 31-43
    • Lowe, G.1
  • 26
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An overview
    • C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 27
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 29
    • 0029713842 scopus 로고    scopus 로고
    • Intensional specifications of security protocols
    • IEEE Computer Society Press
    • A.W. Roscoe. Intensional specifications of security protocols. In 8th IEEE Computer Security Foundations Workshop, pages 28-38. IEEE Computer Society Press, 1996.
    • (1996) 8th IEEE Computer Security Foundations Workshop , pp. 28-38
    • Roscoe, A.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.