메뉴 건너뛰기




Volumn 2618, Issue , 2003, Pages 114-128

A simple language for real-time cryptographic protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS;

EID: 35248873844     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36575-3_9     Document Type: Article
Times cited : (38)

References (17)
  • 1
    • 35248843428 scopus 로고    scopus 로고
    • Compositional Reasoning in the Spi-calculus
    • proc. of FOS-SACS'02
    • M. Boreale and D. Gorla. on Compositional Reasoning in the Spi-calculus In proc. of FOS-SACS'02, LNCS 2303, 2002.
    • (2002) LNCS , vol.2303
    • Boreale, M.1    Gorla, D.2
  • 2
    • 84957023134 scopus 로고    scopus 로고
    • Analysing a Stream Authentication Protocol using Model Checking
    • Procs. ESORICS'02, Springer
    • P. Broadfoot and G. Lowe. Analysing a Stream Authentication Protocol using Model Checking In Procs. ESORICS'02, LNCS, Springer, 2002.
    • (2002) LNCS
    • Broadfoot, P.1    Lowe, G.2
  • 7
    • 84974597207 scopus 로고    scopus 로고
    • Non-interference for the analysis of cryptographic protocols
    • Procs. Int.l Colloquium on Automata, Languages and Programming (ICALP'00), Springer
    • R. Focardi, R. Gorrieri and F. Martinelli. Non-interference for the analysis of cryptographic protocols. In Procs. Int.l Colloquium on Automata, Languages and Programming (ICALP'00), LNCS 1853, 354-372, Springer, 2000.
    • (2000) LNCS , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 9
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proceedings of World Congress on Formal Methods (FM'99), Springer
    • R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), pages 794-813. Springer, LNCS 1708, 1999.
    • (1999) LNCS , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 12
    • 0027666919 scopus 로고
    • Transition system specifications with negative premises
    • J.F. Groote. Transition system specifications with negative premises. Theoretical Computer Science, 118:263-299, 1993.
    • (1993) Theoretical Computer Science , vol.118 , pp. 263-299
    • Groote, J.F.1
  • 13
    • 0033714403 scopus 로고    scopus 로고
    • Protocol Independence through Disjoint Encryption
    • IEEE Press
    • J. Guttman and F.J. Thayer. Protocol Independence through Disjoint Encryption. In Proc. CSFW'00. IEEE Press, 2000.
    • (2000) Proc. CSFW'00
    • Guttman, J.1    Thayer, F.J.2
  • 14
    • 0030708255 scopus 로고    scopus 로고
    • A Hiearchy of Autentication Specifications
    • IEEE Press
    • G. Lowe. A Hiearchy of Autentication Specifications. In Proc. CSFW'97, pp. 31-43, IEEE Press.
    • Proc. CSFW'97 , pp. 31-43
    • Lowe, G.1
  • 16
    • 84944070422 scopus 로고    scopus 로고
    • Analysing Time-Dependent Security Properties in CSP using PVS
    • Procs. ESORICS
    • S. Schneider. Analysing Time-Dependent Security Properties in CSP using PVS. In Procs. ESORICS, LNCS 1895, 2000.
    • (2000) LNCS , vol.1895
    • Schneider, S.1
  • 17
    • 84947938368 scopus 로고    scopus 로고
    • Extending process languages with time
    • Proceedings of AMAST
    • I. Ulidowski and S. Yuen. Extending process languages with time. In Proceedings of AMAST, LNCS 1349, pages 524-538, 1997.
    • (1997) LNCS , vol.1349 , pp. 524-538
    • Ulidowski, I.1    Yuen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.