메뉴 건너뛰기




Volumn 2758, Issue , 2003, Pages 352-366

Verifying second-level security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC MAIL; FORMAL LOGIC; MOBILE SECURITY;

EID: 35248826039     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10930755_23     Document Type: Article
Times cited : (14)

References (18)
  • 1
    • 35248848311 scopus 로고    scopus 로고
    • Computer-Assisted Verification of a Protocol for Certified Email
    • R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), Springer-Verlag, June To appear
    • M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. In R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), Lecture Notes in Comp. Sci. Springer-Verlag, June 2003. To appear.
    • (2003) Lecture Notes in Comp. Sci.
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 84982994153 scopus 로고    scopus 로고
    • Distributed access-rights management with delegation certificates
    • J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues with Distributed Mobile Objects, Springer-Verlag
    • T. Aura. Distributed access-rights management with delegation certificates. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues with Distributed Mobile Objects, volume 1603 of Lecture Notes in Comp. Sci., pages 211-235. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Comp. Sci. , vol.1603 , pp. 211-235
    • Aura, T.1
  • 5
    • 0037237984 scopus 로고    scopus 로고
    • Inductive verification of smart card protocols
    • G. Bella. Inductive verification of smart card protocols. J. of Comp. Sec., 11(1):87-132, 2003.
    • (2003) J. of Comp. Sec. , vol.11 , Issue.1 , pp. 87-132
    • Bella, G.1
  • 7
    • 84949486769 scopus 로고    scopus 로고
    • Mechanical proofs about a non-repudiation protocol
    • R. J. Boulton and P. B. Jackson, editors, Theorem Proving in Higher Order Logics: TPHOLs 2001, Springer
    • G. Bella and L. C. Paulson. Mechanical proofs about a non-repudiation protocol. In R. J. Boulton and P. B. Jackson, editors, Theorem Proving in Higher Order Logics: TPHOLs 2001, volume 2152 of Lecture Notes in Comp. Sci., pages 91-104. Springer, 2001.
    • (2001) Lecture Notes in Comp. Sci. , vol.2152 , pp. 91-104
    • Bella, G.1    Paulson, L.C.2
  • 8
    • 33748314395 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Comp. Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of the 14th IEEE Comp. Sec. Found. Workshop. IEEE Comp. Society Press, 1998.
    • (1998) Proc. of the 14th IEEE Comp. Sec. Found. Workshop
    • Blanchet, B.1
  • 10
    • 0003568551 scopus 로고    scopus 로고
    • Technical report, University of York, Department of Computer Science, November A complete specification of the dark-Jacob library in CAPSL is available at http://www.cs.sri.com/∼millen/capsl
    • J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, University of York, Department of Computer Science, November 1997. Available on the web at http://www-users.cs.york.ac.uk/∼jac/. A complete specification of the dark-Jacob library in CAPSL is available at http://www.cs.sri.com/∼millen/capsl/.
    • (1997) A Survey of Authentication Protocol Literature: Version 1.0
    • Clark, J.1    Jacob, J.2
  • 11
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Comp. Society Press
    • E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In Proc. of the 13th IEEE Comp. Sec. Found. Workshop, pages 144-158. IEEE Comp. Society Press, 2000.
    • (2000) Proc. of the 13th IEEE Comp. Sec. Found. Workshop , pp. 144-158
    • Cohen, E.1
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems: second international workshop, TACAS '96, Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems: second international workshop, TACAS '96, volume 1055 of Lecture Notes in Comp. Sci., pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Comp. Sci. , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Comp. Sec., 6:85-128, 1998.
    • (1998) J. of Comp. Sec. , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 15
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Thins, on Inform. and Sys. Sec., 2(3):332-351, 1999.
    • (1999) ACM Thins. on Inform. and Sys. Sec. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.