메뉴 건너뛰기




Volumn 2772, Issue , 2004, Pages 225-242

Easy intruder deductions

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIAL APPROXIMATION;

EID: 35248836596     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (21)

References (15)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • Proc. CONCUR '02
    • R. Amadio and W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. In Proc. CONCUR '02, volume 2421 of LNCS, pages 499-514, 2002.
    • (2002) LNCS , vol.2421 , pp. 499-514
    • Amadio, R.1    Charatonik, W.2
  • 4
    • 4944261697 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and cryptographic protocols
    • To appear
    • H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Comput. Sci., 2003. To appear.
    • (2003) Theoretical Comput. Sci.
    • Comon, H.1    Cortier, V.2
  • 6
    • 0000029077 scopus 로고
    • Rewrite systems
    • J. van Leeuwen, editor, Formal Models and Semantics, chapter 6, Elsevier Science Publishers and The MIT Press
    • N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B - Formal Models and Semantics, chapter 6, pages 243-320. Elsevier Science Publishers and The MIT Press, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 243-320
    • Dershowitz, N.1    Jouannaud, J.-P.2
  • 10
    • 35248870210 scopus 로고
    • On the faithfulness of formal models. in Mathematical Foundations of Computer Science
    • Springer-Verlag
    • Z. Manna and A. Pnueli. On the faithfulness of formal models. In Mathematical Foundations of Computer Science, volume 520 of Lecture Notes in Computer Science, pages 28-42. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.520 , pp. 28-42
    • Manna, Z.1    Pnueli, A.2
  • 11
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • D. McAllester. Automatic recognition of tractability in inference relations. Journal of the ACM, 40(2):284-303, 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.1
  • 12
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions, composed keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions, composed keys is NP-complete. Theoretical Comput. Sci., 299(1-3):451-475, 2003.
    • (2003) Theoretical Comput. Sci. , vol.299 , Issue.1-3 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 13
    • 0028532997 scopus 로고
    • Cryptoanalysis and protocol failure
    • Nov.
    • G. J. Simmons. Cryptoanalysis and protocol failure. Commun. ACM, 37(11):56-65, Nov. 1994.
    • (1994) Commun. ACM , vol.37 , Issue.11 , pp. 56-65
    • Simmons, G.J.1
  • 15
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • G. Brassard, editor, CRYPTO'89, Springer-Verlag
    • M. Tatebayashi, N. Matsuzaki, and D. B. Newmann. Key distribution protocol for digital mobile communication systems. In G. Brassard, editor, CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 324-334. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newmann, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.