메뉴 건너뛰기




Volumn 2629, Issue , 2003, Pages 115-132

Modeling adversaries in a logic for security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; RECONFIGURABLE HARDWARE;

EID: 35248868917     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40981-6_11     Document Type: Article
Times cited : (36)

References (36)
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Proceedings of the IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), Springer-Verlag
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proceedings of the IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 19144367628 scopus 로고    scopus 로고
    • Towards an awareness-based semantics for security protocol analysis
    • Jean Goubault-Larrecq, editor, Elsevier Science Publishers
    • R. Accorsi, D. Basin, and L. Viganò. Towards an awareness-based semantics for security protocol analysis. In Jean Goubault-Larrecq, editor, Electronic Notes in Theoretical Computer Science, volume 55. Elsevier Science Publishers, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.55
    • Accorsi, R.1    Basin, D.2    Viganò, L.3
  • 5
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of the 13th Annual International Cryptology Conference (CRYPTO '93)
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of the 13th Annual International Cryptology Conference (CRYPTO '93), volume 773 of Lecture Notes in Computer Science, pages 232-249, 1993.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0025641513 scopus 로고
    • A logic of communication in hostile environment
    • IEEE Computer Society Press
    • P. Bieber. A logic of communication in hostile environment. In Proceedings of the Computer Security Foundations Workshop, pages 14-22. IEEE Computer Society Press, 1990.
    • (1990) Proceedings of the Computer Security Foundations Workshop , pp. 14-22
    • Bieber, P.1
  • 11
    • 85034636582 scopus 로고
    • On the security of ping-pong protocols when implemented using the RSA
    • Proceedings of Crypto'85, Springer-Verlag
    • S. Even, O. Goldreich, and A. Shamir. On the security of ping-pong protocols when implemented using the RSA. In Proceedings of Crypto'85, volume 218 of Lecture Notes in Computer Science, pages 58-72. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.218 , pp. 58-72
    • Even, S.1    Goldreich, O.2    Shamir, A.3
  • 12
    • 0023842375 scopus 로고
    • Belief, awareness, and limited reasoning
    • R. Fagin and J. Y. Halpern. Belief, awareness, and limited reasoning. Artificial Intelligence, 34:39-76, 1988.
    • (1988) Artificial Intelligence , vol.34 , pp. 39-76
    • Fagin, R.1    Halpern, J.Y.2
  • 13
    • 84976774564 scopus 로고
    • Reasoning about knowledge and probability
    • R. Fagin and J. Y. Halpern. Reasoning about knowledge and probability. Journal of the ACM, 41(2):340-367, 1994.
    • (1994) Journal of the ACM , vol.41 , Issue.2 , pp. 340-367
    • Fagin, R.1    Halpern, J.Y.2
  • 18
    • 0027665952 scopus 로고
    • Knowledge, probability, and adversaries
    • J. Y. Halpern and M. R. Tuttle. Knowledge, probability, and adversaries. Journal of the ACM, 40(4):917-962, 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.4 , pp. 917-962
    • Halpern, J.Y.1    Tuttle, M.R.2
  • 20
    • 0345373244 scopus 로고
    • Announced in
    • Announced in Journal of Symbolic Logic, 24, 1959, p. 323.
    • (1959) Journal of Symbolic Logic , vol.24 , pp. 323
  • 22
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 26
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 30
    • 0024014116 scopus 로고
    • Protocol failures in cryptosystems
    • J. H. Moore. Protocol failures in cryptosystems. Proceedings of the IEEE, 76(5):594-602, 1988.
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5 , pp. 594-602
    • Moore, J.H.1
  • 32
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 33
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1/2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 34
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Y. A. Ryan and S. A. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.Y.A.1    Schneider, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.