메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 356-383

A comparison between strand spaces and multiset rewriting for security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35248852076     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_22     Document Type: Review
Times cited : (8)

References (13)
  • 1
    • 84948759231 scopus 로고    scopus 로고
    • A Formal Analysis of Some Properties of Kerberos 5 Using MSR
    • Cape Breton, NS, Canada, June IEEE Computer Society Press
    • Frederic Butler, Iliano Cervesato, Aaron D. Jaggard, and Andre Scedrov. A Formal Analysis of Some Properties of Kerberos 5 Using MSR. In Fifteenth Computer Security Foundations Workshop - CSFW-15, pages 175-190, Cape Breton, NS, Canada, June 2002. IEEE Computer Society Press.
    • (2002) Fifteenth Computer Security Foundations Workshop - CSFW-15 , pp. 175-190
    • Butler, F.1    Cervesato, I.2    Jaggard, A.D.3    Scedrov, A.4
  • 4
    • 0033698744 scopus 로고    scopus 로고
    • Relating strands and multiset rewriting for security protocol analysis
    • P. Syverson, editor, Cambrige, UK, 3-5 July IEEE Computer Society Press
    • Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell, and Andre Scedrov. Relating strands and multiset rewriting for security protocol analysis. In P. Syverson, editor, 13th IEEE Computer Security Foundations Workshop - CSFW'00, pages 35-51, Cambrige, UK, 3-5 July 2000. IEEE Computer Society Press.
    • (2000) 13th IEEE Computer Security Foundations Workshop - CSFW'00 , pp. 35-51
    • Cervesato, I.1    Durgin, N.A.2    Lincoln, P.D.3    Mitchell, J.C.4    Scedrov, A.5
  • 5
    • 84955619856 scopus 로고    scopus 로고
    • Typed MSR: Syntax and Examples
    • V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, editors, First International Workshop on Mathematical Methods. Models and Architectures for Computer Networks Security - MMM'01, St. Petersburg, Russia, May Springer-Verlag
    • Iliano Cervesato. Typed MSR: Syntax and Examples. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, editors, First International Workshop on Mathematical Methods. Models and Architectures for Computer Networks Security - MMM'01, pages 159-177, St. Petersburg, Russia, May 2001. Springer-Verlag LNCS 2052.
    • (2001) LNCS , vol.2052 , pp. 159-177
    • Cervesato, I.1
  • 11
    • 0032670463 scopus 로고    scopus 로고
    • Honest functions and their application to the analysis of cryptographic protocols
    • P. Syverson, editor, Mordano, Italy, June IEEE Computer Society Press
    • A. Maneki. Honest functions and their application to the analysis of cryptographic protocols. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 83-89, Mordano, Italy, June 1999. IEEE Computer Society Press.
    • (1999) Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99 , pp. 83-89
    • Maneki, A.1
  • 12
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 13
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Mordano, Italy, June IEEE Computer Society Press
    • Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192-202, Mordano, Italy, June 1999. IEEE Computer Society Press.
    • (1999) Proceedings of the Twelth IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.