메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 86-100

Automatic proof of strong secrecy for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; SECRECY; SECURITY PROTOCOLS;

EID: 3543058869     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301317     Document Type: Conference Paper
Times cited : (136)

References (44)
  • 2
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • NATO Science Series, IOS Press, Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany
    • M. Abadi. Security Protocols and their Properties. In Foundations of Secure Computation, NATO Science Series, pages 39-60. IOS Press, 2000. Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999).
    • (1999) Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 6
    • 0000298407 scopus 로고    scopus 로고
    • A Bisimulation method for cryptographic protocols
    • Winter
    • M. Abadi and A. D. Gordon. A Bisimulation Method for Cryptographic Protocols. Nordic Journal of Computing, 5(4):267-303, Winter 1998.
    • (1998) Nordic Journal of Computing , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1): 1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 9
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Jan.
    • M. Abadi and R. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 13
  • 26
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12): 198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 28
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Sept.
    • R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571, Sept. 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 31
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • ACM, May
    • S. Goldwasser and S. Micali. Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information. In 14th Annual ACM Symposium on Theory of Computing, pages 365-377. ACM, May 1982.
    • (1982) 14th Annual ACM Symposium on Theory of Computing , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 37
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • May
    • A. C. Myers and B. Liskov. Complete, Safe Information Flow with Decentralized Labels. In IEEE Symposium on Security and Privacy, pages 186-197, May 1998.
    • (1998) IEEE Symposium on Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 38
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees. Efficient and Timely Mutual Authentication. Operating Systems Review, 21(1):8-10, 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 39
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.