메뉴 건너뛰기




Volumn 2619, Issue , 2003, Pages 284-298

A new knowledge representation strategy for cryptographic protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; COMPUTATIONAL LINGUISTICS; CRYPTOGRAPHY; KNOWLEDGE REPRESENTATION; MODEL CHECKING; NETWORK PROTOCOLS;

EID: 35248859741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36577-x_21     Document Type: Article
Times cited : (5)

References (17)
  • 1
    • 2942563373 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols the Spi Calculus
    • January
    • M. Abadi, and A. D. Gordon, "A Calculus for Cryptographic Protocols The Spi Calculus", Digital Research Report, vol. 149, January 1998, pp. 1-110.
    • (1998) Digital Research Report , vol.149 , pp. 1-110
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the Reachability Problem in Cryptographic Protocols
    • Proc. of CONCUR'2000, Springer-Verlag
    • R. Amadio, and D. Lugiez, "On the Reachability Problem in Cryptographic Protocols", Proc. of CONCUR'2000, LNCS 1877, pp. 380-394, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 4
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic Trace Analysis of Cryptographic Protocols
    • Proc. 28th ICALP, Springer-Verlag
    • M. Boreale, "Symbolic Trace Analysis of Cryptographic Protocols", In Proc. 28th ICALP, Vol. 2076 of Lecture Notes in Computer Science, Springer-Verlag, pp. 667-681, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 5
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • Chapman & Hall, London
    • E. M. Clarke, S. Jha, and W. Marrero, "Using state space exploration and a natural deduction style message derivation engine to verify security protocols", Proc. of IFIP PROCOMET, Chapman & Hall, London, 1998, pp. p.87-106.
    • (1998) Proc. of IFIP PROCOMET , pp. 87-106
    • Clarke, E.M.1    Jha, S.2    Marrero, W.3
  • 8
    • 3543072509 scopus 로고    scopus 로고
    • A state-exploration technique for spi-calculus testing equivalence verification
    • Pisa, October
    • L. Durante, R. Sisto, and A. Valenzano, "A state-exploration technique for spi-calculus testing equivalence verification", Proc. of FORTE/PSTV 2000, Pisa, October 2000, pp. 155-170.
    • (2000) Proc. of FORTE/PSTV 2000 , pp. 155-170
    • Durante, L.1    Sisto, R.2    Valenzano, A.3
  • 12
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. of TACAS'97, Springer
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR", Proc. of TACAS'97, Springer LNCS 1055, 1996.
    • (1996) LNCS , vol.1055
    • Lowe, G.1
  • 13
    • 0027578148 scopus 로고
    • Automatic Recognition of Tractability in Inference Relations
    • April
    • D. A. McAllester, "Automatic Recognition of Tractability in Inference Relations", Journal of the ACM, Vol. 40, No. 2, April 1993, pp. 284-303.
    • (1993) Journal of the ACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.A.1
  • 15
    • 44049113210 scopus 로고
    • A Calculus of mobile processes, parts I and II
    • September
    • R. Milner, J. Parrow, and D. Walker, "A Calculus of mobile processes, parts I and II", Information and Computation, pages 1-40 and 41-77, September 1992.
    • (1992) Information and Computation , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 16
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson, "The inductive approach to verifying cryptographic protocols", Journal of Computer Security, Vol. 6, pp. 85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.