메뉴 건너뛰기




Volumn 2618, Issue , 2003, Pages 10-21

What makes a cryptographic protocol secure? The evolution of requirements specification in formal cryptographic protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

SPECIFICATIONS;

EID: 35248838292     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36575-3_2     Document Type: Article
Times cited : (8)

References (32)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0012796292 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • to appear
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, to appear.
    • Journal of Cryptology
    • Abadi, M.1    Rogaway, P.2
  • 9
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • March
    • D. Dolev and A. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 12
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • U. Montanari, editor, 27th International Colloquium on Automata, Languages and Programming (ICALP'00) July
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In U. Montanari, editor, 27th International Colloquium on Automata, Languages and Programming (ICALP'00). Springer Verlag: LNCS 1583, July 2000.
    • (2000) Springer Verlag: LNCS , vol.1583
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 13
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, IEEE Computer Society
    • Li Gong and Paul Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society, 1998.
    • (1998) Dependable Computing for Critical Applications 5 , pp. 79-100
    • Gong, L.1    Syverson, P.2
  • 16
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols
    • International Software Security Symposium (ISSS 2002)
    • A. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In International Software Security Symposium (ISSS 2002). Springer LNCS, 2003.
    • (2003) Springer LNCS
    • Gordon, A.1    Jeffrey, A.2
  • 17
    • 0038290894 scopus 로고    scopus 로고
    • Internet Draft draft-ietf-ipsec-soi-features-01.txt, May 31
    • Paul Hoffman. Features of proposed successors to IKE. Internet Draft draft-ietf-ipsec-soi-features-01.txt, May 31 2002. available at http://ietf.org/internet-drafts/draft-ietf-ipsec-soi-features-01.txt.
    • (2002) Features of Proposed Successors to IKE
    • Hoffman, P.1
  • 20
    • 0342880800 scopus 로고
    • Applying Formal Methods to the Analysis of a Key Management Protocol
    • C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5-53, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 21
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • C. Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 2001.
    • (2001) Journal of Computer Security
    • Meadows, C.1
  • 22
    • 35248830539 scopus 로고    scopus 로고
    • A formal specification of requirements for payment in the SET protocol
    • Proceedings of Financial Cryptography '98
    • C. Meadows and P. Syverson. A formal specification of requirements for payment in the SET protocol. In Proceedings of Financial Cryptography '98. Springer-Verlag LLNCS, 1998.
    • (1998) Springer-Verlag LLNCS
    • Meadows, C.1    Syverson, P.2
  • 30
    • 1442341305 scopus 로고
    • Formal requirements for key distribution protocols
    • Springer-Verlag
    • P. Syverson and C. Meadows. Formal requirements for key distribution protocols. In Proceedings of Eurocrypt '94. Springer-Verlag, 1994.
    • (1994) Proceedings of Eurocrypt '94
    • Syverson, P.1    Meadows, C.2
  • 31
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.
    • (1996) Designs, Codes, and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.