메뉴 건너뛰기




Volumn 2914, Issue , 2003, Pages 363-374

Tagging makes secrecy decidable with unbounded nonces as well

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SOFTWARE ENGINEERING;

EID: 35248886574     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24597-1_31     Document Type: Article
Times cited : (37)

References (16)
  • 1
  • 2
    • 35248878042 scopus 로고    scopus 로고
    • Verification of Cryptographic Protocols: Tagging Enforces Termination
    • Goedon, A.D. ed. Proc. FoSSaCS'03
    • Blanchet, B. and Podelski, P., "Verification of Cryptographic Protocols: Tagging Enforces Termination", In Goedon, A.D. ed. Proc. FoSSaCS'03, LNCS 2620, 2003, 136-152.
    • (2003) LNCS , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, P.2
  • 3
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and applications to cryptographic protocols
    • Nieuwenhuis, R. ed. Proc. RTA'2003
    • Comon-Lundh, H. and Cortier, V., "New decidability results for fragments of first-order logic and applications to cryptographic protocols", In Nieuwenhuis, R. ed. Proc. RTA'2003, LNCS 2706, 2003, 148-164.
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 4
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols
    • Proc. ICALP 2001
    • Comon-Lundh, H., Cortier, V. and Mitchell, J.C., "Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols", In Proc. ICALP 2001, LNCS 2076, 2001.
    • (2001) LNCS , vol.2076
    • Comon-Lundh, H.1    Cortier, V.2    Mitchell, J.C.3
  • 6
  • 8
    • 0033683193 scopus 로고    scopus 로고
    • How to Prevent Type Flaw Attacks on Security Protocols
    • Heather, J., Lowe, G. and Schneider, S. "How to Prevent Type Flaw Attacks on Security Protocols", In Proc. 13th IEEE CSFW, 2000, 255-268.
    • (2000) Proc. 13th IEEE CSFW , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 10
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe, G., "Towards a completeness result for model checking of security protocols", In Journal of computer security, 7, 1999, 89-146.
    • (1999) Journal of Computer Security , vol.7 , pp. 89-146
    • Lowe, G.1
  • 12
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C., "The inductive approach to verifying cryptographic protocols", In Journal of computer security, 6, 1998, 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 13
    • 11944263324 scopus 로고    scopus 로고
    • A decidable subclass of unbounded security protocols
    • Gorrieri, R. ed. April
    • Ramanujam, R. and Suresh, S.P., "A decidable subclass of unbounded security protocols", In Gorrieri, R. ed. Proc. WITS'03, April 2003, 11-20.
    • (2003) Proc. WITS'03 , pp. 11-20
    • Ramanujam, R.1    Suresh, S.P.2
  • 14
    • 11944256048 scopus 로고    scopus 로고
    • An equivalence on terms for security protocols
    • Bharadwaj, R. ed. April
    • Ramanujam, R. and Suresh, S.P., "An equivalence on terms for security protocols", In Bharadwaj, R. ed. Proc. AVIS'03, April 2003, 45-56.
    • (2003) Proc. AVIS'03 , pp. 45-56
    • Ramanujam, R.1    Suresh, S.P.2
  • 16
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • Rusinowitch, M. and Turuani, M., "Protocol insecurity with finite number of sessions is NP-complete", In Proc. CSFW 14, 2001, 174-190.
    • (2001) Proc. CSFW 14 , pp. 174-190
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.