메뉴 건너뛰기




Volumn 389, Issue 3, 2007, Pages 484-511

A formal semantics for protocol narrations

Author keywords

Cryptographic protocols; Protocol narrations; Spi calculus

Indexed keywords

CRYPTOGRAPHY; INFORMATION DISSEMINATION; MESSAGE PASSING; OPTIMIZATION; SEMANTICS;

EID: 36048955687     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2007.09.005     Document Type: Article
Times cited : (14)

References (30)
  • 1
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • Foundations of Secure Computation, IOS Press
    • Abadi M. Security protocols and their properties. Foundations of Secure Computation. NATO ASI (2000), IOS Press 39-60
    • (2000) NATO ASI , pp. 39-60
    • Abadi, M.1
  • 2
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • ACM
    • Abadi M., and Fournet C. Mobile values, new names, and secure communication. Proceedings of POPL '01 (2001), ACM 104-115
    • (2001) Proceedings of POPL '01 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Proceedings of ESORICS'03, Springer-Verlag, Heidelberg
    • Basin D., Mödersheim S., and Viganò L. An on-the-fly model-checker for security protocol analysis. Proceedings of ESORICS'03. LNCS vol. 2808 (2003), Springer-Verlag, Heidelberg 253-270
    • (2003) LNCS , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 7
    • 84942246406 scopus 로고    scopus 로고
    • C. Bodei, M. Buchholtz, P. Degano, F. Nielson, H. Nielson, Automatic validation of protocol narration, in: Proceedings of 16th IEEE Computer Security Foundations Workshop, CSFW 16, 2003, pp. 126-140
  • 9
    • 35048863862 scopus 로고    scopus 로고
    • Symbolic bisimulation in the spi calculus
    • Proceedings of CONCUR 2004, Springer
    • Borgström J., Briais S., and Nestmann U. Symbolic bisimulation in the spi calculus. Proceedings of CONCUR 2004. LNCS vol. 3170 (2004), Springer 161-176
    • (2004) LNCS , vol.3170 , pp. 161-176
    • Borgström, J.1    Briais, S.2    Nestmann, U.3
  • 10
    • 36049025942 scopus 로고    scopus 로고
    • S. Briais, Formal proofs about hedges using the Coq proof assistant. http://lamp.epfl.ch/~sbriais/spi/hedges/hedge.html, 2004
  • 11
    • 36049013425 scopus 로고    scopus 로고
    • S. Briais, spyer. http://lamp.epfl.ch/spyer, 2006
  • 12
    • 23144446730 scopus 로고    scopus 로고
    • Deconstructing alice and bob
    • Proceedings of the ICALP 2005 Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA'05
    • Caleiro C., Viganò L., and Basin D. Deconstructing alice and bob. Proceedings of the ICALP 2005 Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA'05. ENTCS vol. 135.1 (2005) 3-22
    • (2005) ENTCS , vol.135 1 , pp. 3-22
    • Caleiro, C.1    Viganò, L.2    Basin, D.3
  • 13
    • 33750486827 scopus 로고    scopus 로고
    • On the semantics of alice and bob specifications of security protocols
    • Caleiro C., Viganò L., and Basin D. On the semantics of alice and bob specifications of security protocols. Theoretical Computer Science 367 1 (2006) 88-122
    • (2006) Theoretical Computer Science , vol.367 , Issue.1 , pp. 88-122
    • Caleiro, C.1    Viganò, L.2    Basin, D.3
  • 14
    • 36048989109 scopus 로고    scopus 로고
    • J.A. Clark, J.L. Jacob, A survey of authentication protocol literature, Technical Report 1.0, University of York, 1997
  • 15
    • 0035751907 scopus 로고    scopus 로고
    • F. Crazzolara, G. Winskel, Events in security protocols, in: ACM Conference on Computer and Communications Security, 2001, pp. 96-105
  • 16
    • 84877781491 scopus 로고    scopus 로고
    • Composing strand spaces
    • FSTTCS '02. Agrawal M., and Seth A. (Eds), Springer
    • Crazzolara F., and Winskel G. Composing strand spaces. In: Agrawal M., and Seth A. (Eds). FSTTCS '02. LNCS vol. 2556 (2002), Springer 97-108
    • (2002) LNCS , vol.2556 , pp. 97-108
    • Crazzolara, F.1    Winskel, G.2
  • 17
    • 24944514681 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings)
    • Cremers C., and Mauw S. Operational semantics of security protocols. Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings). LNCS vol. 3466 (2005)
    • (2005) LNCS , vol.3466
    • Cremers, C.1    Mauw, S.2
  • 19
    • 36048964281 scopus 로고    scopus 로고
    • C. Gensoul, Spyer - un compilateur de protocoles cryptographiques, Semester Project Report, EPFL, July 2003
  • 20
    • 0033714403 scopus 로고    scopus 로고
    • J.D. Guttman, F.J. Thayer Fábrega, Protocol independence through disjoint encryption, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW'00, 2000, pp. 24-34
  • 23
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • Logic for Programming and Automated Reasoning, Springer-Verlag
    • Jacquemard F., Rusinowitch M., and Vigneron L. Compiling and verifying security protocols. Logic for Programming and Automated Reasoning. LNCS vol. 1955 (2000), Springer-Verlag 131-160
    • (2000) LNCS , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 24
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe G. Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6 (1998) 53-84
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 26
    • 36049014748 scopus 로고    scopus 로고
    • J.K. Millen, CAPSL: Common authentication protocol specification language. http://www.csl.sri.com/users/millen/capsl/
  • 27
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 1-2 (1998) 85-128
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 28
    • 33646178885 scopus 로고    scopus 로고
    • Translating security protocols from informal notation into spi calculus
    • written in Japanese, abstract in English
    • Sumii E., Tatsuzawa H., and Yonezawa A. Translating security protocols from informal notation into spi calculus. IPSJ Transactions on Programming 45 (SIG 12) 1-10 (2004) written in Japanese, abstract in English
    • (2004) IPSJ Transactions on Programming , vol.45 SIG 12 , Issue.1-10
    • Sumii, E.1    Tatsuzawa, H.2    Yonezawa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.