메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 384-416

Data access specification and the most powerful symbolic attacker in MSR

Author keywords

[No Author keywords available]

Indexed keywords

SPECIFICATIONS;

EID: 35248898859     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_23     Document Type: Article
Times cited : (10)

References (28)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 9
    • 3042580206 scopus 로고    scopus 로고
    • A specification language for crypto-protocol based on multiset rewriting, dependent types and subsorting
    • G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Paphos, Cyprus
    • Iliano Cervesato. A specification language for crypto-protocol based on multiset rewriting, dependent types and subsorting. In G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Workshop on Specification, Analysis and Validation for Emerging Technologies - SAVE'01, Paphos, Cyprus, 2001.
    • (2001) Workshop on Specification, Analysis and Validation for Emerging Technologies - SAVE'01
    • Cervesato, I.1
  • 10
    • 84955619856 scopus 로고    scopus 로고
    • Typed MSR: Syntax and examples
    • V. Gorodetski, V. Skormin, and L. Popyack, editors, Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security - MMM'01, St. Petersburg, Russia, Springer-Verlag
    • Iliano Cervesato. Typed MSR: Syntax and examples. In V. Gorodetski, V. Skormin, and L. Popyack, editors, Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security - MMM'01, pages 159-177, St. Petersburg, Russia, 2001. Springer-Verlag LNCS 2052.
    • (2001) LNCS , vol.2052 , pp. 159-177
    • Cervesato, I.1
  • 19
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Gavin Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: an overview. J. Logic Programming, 26(2):113-131, 1996.
    • (1996) J. Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 24
    • 0000360205 scopus 로고
    • Refinement types for logical frameworks
    • Herman Geuvers, editor, Nijmegen, The Netherlands, May
    • Frank Pfenning. Refinement types for logical frameworks. In Herman Geuvers, editor, Informal Proceedings of the Workshop on Types for Proofs and Programs, pages 285-299, Nijmegen, The Netherlands, May 1993.
    • (1993) Informal Proceedings of the Workshop on Types for Proofs and Programs , pp. 285-299
    • Pfenning, F.1
  • 26
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • Mordano, Italy, June
    • Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192-202, Mordano, Italy, June 1999.
    • (1999) Proceedings of the Twelth IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.