메뉴 건너뛰기




Volumn 4734 LNCS, Issue , 2007, Pages 406-421

Synthesizing secure protocols

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSFER; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MESSAGE PASSING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 38048999097     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74835-9_27     Document Type: Conference Paper
Times cited : (13)

References (17)
  • 1
    • 0037052276 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • Abadi, M., Fournet, C., Gonthier, G.: Secure implementation of channel abstractions. Inf. Comput. 174(1), 37-83 (2002)
    • (2002) Inf. Comput , vol.174 , Issue.1 , pp. 37-83
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 3
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Gordon, A.D, ed, ETAPS 2003 and FOSSACS 2003, Springer, Heidelberg
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) ETAPS 2003 and FOSSACS 2003. LNCS, vol. 2620, Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2620
    • Blanchet, B.1    Podelski, A.2
  • 4
    • 84947780217 scopus 로고    scopus 로고
    • Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 148-164. Springer, Heidelberg (2003)
    • Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148-164. Springer, Heidelberg (2003)
  • 6
    • 24644437051 scopus 로고    scopus 로고
    • Cortier, V., Warinschi, B.: Computationally Sound, Automated Proofs for Security Protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 157-171. Springer, Heidelberg (2005)
    • Cortier, V., Warinschi, B.: Computationally Sound, Automated Proofs for Security Protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
  • 7
    • 38048998552 scopus 로고    scopus 로고
    • Synthesizing secure protocols
    • INRIA April, available at
    • Cortier, V., Warinschi, B., Zǎlinescu, E.: Synthesizing secure protocols. Inria research report, INRIA (April 2007), available at http://www.loria.fr/cortier/Papiers/compiler.pdf
    • (2007) Inria research report
    • Cortier, V.1    Warinschi, B.2    Zǎlinescu, E.3
  • 8
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423-482 (2005)
    • (2005) J. Comput. Secur , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 12
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • Rockport, Massachusetts, USA, IEEE Computer Society Press, Los Alamitos
    • Lowe, G.: A hierarchy of authentication specifications. In: CSFW 1997, Rockport, Massachusetts, USA, IEEE Computer Society Press, Los Alamitos (1997)
    • (1997) CSFW
    • Lowe, G.1
  • 15
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • IEEE Computer Society Press, Los Alamitos
    • Lowe, G.: Towards a completeness result for model checking of security protocols. In: CSFW 1998, IEEE Computer Society Press, Los Alamitos (1998)
    • (1998) CSFW
    • Lowe, G.1
  • 17
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete. In: CSFW
    • Los Alamitos
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW 2001, pp. 174-190. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) 174-190. IEEE Computer Society Press , pp. 2001
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.