메뉴 건너뛰기




Volumn 2747, Issue , 2003, Pages 269-278

Symbolic analysis of crypto-protocols based on modular exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL LINGUISTICS; NETWORK SECURITY; SEMANTICS;

EID: 35248897641     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45138-9_21     Document Type: Article
Times cited : (8)

References (16)
  • 1
    • 0035035153 scopus 로고    scopus 로고
    • Mobile Values, New Names, and Secure Communication
    • M. Abadi, C. Fournet. Mobile Values, New Names, and Secure Communication. In Conf. Rec. of POPL'01, 2001.
    • (2001) Conf. Rec. of POPL'01
    • Abadi, M.1    Fournet, C.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Proc. of Concur'00, Springer-Verlag, Full version: RR 3915, INRIA Sophia Antipolis
    • R.M. Amadio, S. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of Concur'00, LNCS 1877, Springer-Verlag, 2000. Full version: RR 3915, INRIA Sophia Antipolis.
    • (2000) LNCS , vol.1877
    • Amadio, R.M.1    Lugiez, S.2
  • 3
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic Trace Analysis of Cryptographic Protocols
    • Proc. of ICALP'01, Springer-Verlag
    • M. Boreale. Symbolic Trace Analysis of Cryptographic Protocols. In Proc. of ICALP'01, LNCS 2076, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2076
    • Boreale, M.1
  • 4
    • 0036037230 scopus 로고    scopus 로고
    • Experimenting with STA, a Tool for Automatic Analysis of Security Protocols
    • ACM Press
    • M. Boreale, M. Buscemi. Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In Proc. of SAC'02, ACM Press, 2002.
    • (2002) Proc. of SAC'02
    • Boreale, M.1    Buscemi, M.2
  • 5
    • 84874713281 scopus 로고    scopus 로고
    • A Framework for the Analysis of Security Protocol
    • Proc. of CONCUR '02, Springer-Verlag
    • M. Boreale and M. Buscemi. A Framework for the Analysis of Security Protocol. In Proc. of CONCUR '02, LNCS 2421. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2421
    • Boreale, M.1    Buscemi, M.2
  • 6
    • 33645585862 scopus 로고    scopus 로고
    • On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol
    • ENTS Series. Elsevier Science
    • M. Boreale and M. Buscemi. On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol. To appear in Proc. of FCS'03, ENTS Series. Elsevier Science, 2003.
    • (2003) Proc. of FCS'03
    • Boreale, M.1    Buscemi, M.2
  • 7
    • 9444288812 scopus 로고    scopus 로고
    • An NP Decision Procedure for Protocol Insecurity with Xor
    • IEEE Computer Society Press
    • Y. Chevalier, R. Kuesters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with Xor. In Proc. of LICS '03, IEEE Computer Society Press, 2003.
    • (2003) Proc. of LICS '03
    • Chevalier, Y.1    Kuesters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 8
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and ping-pong protocols
    • Proc. of ICALP'01, Springer-Verlag
    • H. Comon, V. Cortier, J. Mitchell. Tree automata with one memory, set constraints and ping-pong protocols. In Proc. of ICALP'01, LNCS 2076, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2076
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 9
    • 9444264816 scopus 로고    scopus 로고
    • Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
    • IEEE Computer Society Press
    • H. Comon-Lundh and V. Shmatikov. Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. In Proc. LICS '03, IEEE Computer Society Press, 2003.
    • (2003) Proc. LICS '03
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 12
    • 51149098006 scopus 로고    scopus 로고
    • An E-unification Algorithm for Analyzing Protocols that Use Modular Exponentiation
    • Proc. of RTA '03, Springer-Verlag
    • D. Kapur, P. Narendran, and L. Wang. An E-unification Algorithm for Analyzing Protocols that Use Modular Exponentiation. In Proc. of RTA '03, LNCS 2706, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2706
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Proc. of TACAS'96, Springer-Verlag
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In Proc. of TACAS'96, LNCS 1055, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1055
    • Lowe, G.1
  • 15
    • 70349714960 scopus 로고    scopus 로고
    • Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation
    • IEEE Computer Society Press
    • J. Millen and V. Shmatikov. Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. In Proc. of 16th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2003.
    • (2003) Proc. of 16th IEEE Computer Security Foundations Workshop
    • Millen, J.1    Shmatikov, V.2
  • 16
    • 13544272458 scopus 로고    scopus 로고
    • The TRUST Protocol Analyser, Automatic and Efficient Verification of Cryptographic Protocols
    • V. Vanackère. The TRUST Protocol Analyser, Automatic and Efficient Verification of Cryptographic Protocols. In Proc. of Verify '02, 2002.
    • (2002) Proc. of Verify '02
    • Vanackère, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.