메뉴 건너뛰기




Volumn 4393 LNCS, Issue , 2007, Pages 646-657

On the automatic analysis of recursive security protocols with XOR

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DECISION THEORY; NUMBER THEORY; RECURSIVE FUNCTIONS; SECURITY OF DATA;

EID: 35548966087     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70918-3_55     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 1
    • 38049097683 scopus 로고    scopus 로고
    • J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
    • J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
  • 2
    • 0041967380 scopus 로고    scopus 로고
    • An NP Decision Procedure for Protocol Insecurity with XOR
    • IEEE, Computer Society Press
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In LICS 2003, pages 261-270. IEEE, Computer Society Press, 2003.
    • (2003) LICS 2003 , pp. 261-270
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 3
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
    • FSTTCS 2003, of, Springer
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In FSTTCS 2003, volume 2914 of LNCS, pages 124-135. Springer, 2003.
    • (2003) LNCS , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 4
    • 14044254755 scopus 로고    scopus 로고
    • Deciding the Security of Protocols with Commuting Public Key Encryption
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption. ENTCS, 125(1):55-66, 2005.
    • (2005) ENTCS , vol.125 , Issue.1 , pp. 55-66
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 5
    • 84947780217 scopus 로고    scopus 로고
    • New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols
    • 2706 of, Springer
    • H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In RTA 2003, volume 2706 of LNCS, pages 148-164. Springer, 2003.
    • (2003) LNCS , vol.RTA 2003 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 6
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • IEEE, Computer Society Press
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003, pages 271-280. IEEE, Computer Society Press, 2003.
    • (2003) LICS 2003 , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 7
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security, 14(1):1-43, 2006.
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 8
    • 14844295030 scopus 로고    scopus 로고
    • On the Decidability of Cryptographic Protocols with Open-ended Data Structures
    • R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. International Journal of Information Security, 4(1-2):49-70, 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 49-70
    • Küsters, R.1
  • 9
    • 38049123154 scopus 로고    scopus 로고
    • On the Automatic Analysis of Recursive Security Protocols with XOR
    • Available from
    • R. Küsters and T. Truderung On the Automatic Analysis of Recursive Security Protocols with XOR. Technial Report, 2007. Available from http://people.inf.ethz.ch/kuestral/publications_html/KuestersTruderung-TR-STACS- 2007.pdf.
    • (2007) Technial Report
    • Küsters, R.1    Truderung, T.2
  • 10
    • 35048832860 scopus 로고    scopus 로고
    • Automata-based Analysis of Recursive Cryptographic Protocols
    • STAGS 2004, of, Springer
    • R. Küsters and T. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. In STAGS 2004, volume 2996 of LNCS, pages 382-393. Springer, 2004.
    • (2004) LNCS , vol.2996 , pp. 382-393
    • Küsters, R.1    Wilke, T.2
  • 11
    • 0030696539 scopus 로고    scopus 로고
    • Mechanized Proofs for a Recursive Authentication Protocol
    • IEEE Computer Society Press
    • L.C. Paulson. Mechanized Proofs for a Recursive Authentication Protocol. In CSFW-10, pages 84-95. IEEE Computer Society Press, 1997.
    • (1997) CSFW-10 , pp. 84-95
    • Paulson, L.C.1
  • 12
    • 0034822650 scopus 로고    scopus 로고
    • A Security Analysis of the Cliques Protocols Suites
    • IEEE Computer Society Press
    • O. Pereira and J.-J. Quisquater. A Security Analysis of the Cliques Protocols Suites. In CSFW-14, pages 73-81, IEEE Computer Society Press, 2001.
    • (2001) CSFW-14 , pp. 73-81
    • Pereira, O.1    Quisquater, J.-J.2
  • 13
  • 14
    • 35048827395 scopus 로고    scopus 로고
    • V. Shmatikov. Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. In (ESOP 2004), 2986 of LNCS, pages 355-369. Springer, 2004.
    • V. Shmatikov. Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. In (ESOP 2004), volume 2986 of LNCS, pages 355-369. Springer, 2004.
  • 15
    • 27344455431 scopus 로고    scopus 로고
    • Selecting theories and recursive protocols
    • CONCUR 2005, of, Springer
    • T. Truderung. Selecting theories and recursive protocols. In CONCUR 2005, volume 3653 of LNCS, pages 217-232. Springer, 2005.
    • (2005) LNCS , vol.3653 , pp. 217-232
    • Truderung, T.1
  • 16
    • 26944478183 scopus 로고    scopus 로고
    • On the complexity of equational horn clauses
    • CADE 2005, of, Springer
    • K.N. Verma, H. Seidl, and T. Schwentick. On the complexity of equational horn clauses. In CADE 2005, volume 3328 of LNCS, pages 337-352. Springer, 2005.
    • (2005) LNCS , vol.3328 , pp. 337-352
    • Verma, K.N.1    Seidl, H.2    Schwentick, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.