메뉴 건너뛰기




Volumn 4677 LNCS, Issue , 2007, Pages 1-23

Security protocols: Principles and calculi tutorial notes

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE REPRESENTATION; NETWORK PROTOCOLS;

EID: 38049061143     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74810-6_1     Document Type: Conference Paper
Times cited : (9)

References (83)
  • 2
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1), 102-146 (2005)
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 24344493908 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58(1-2), 3-27 (2005)
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 8
    • 0003092378 scopus 로고    scopus 로고
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1998) (An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998)
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1998) (An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998)
  • 9
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering 22(1), 6-15 (1996)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 10
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 12
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Palamidessi, C, ed, CONCUR 2000, Springer, Heidelberg
    • Amadio, R., Lugiez, D.: On the reachability problem in cryptographic protocols. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 380-395. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1877 , pp. 380-395
    • Amadio, R.1    Lugiez, D.2
  • 13
    • 84958762859 scopus 로고    scopus 로고
    • Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, 1742, pp. 15-27. Springer, Heidelberg (1999)
    • Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, vol. 1742, pp. 15-27. Springer, Heidelberg (1999)
  • 14
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
    • Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236-247. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 19
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 21
    • 33845212195 scopus 로고    scopus 로고
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WSsecurity protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, pp. 88-106. Springer, Heidelberg (2006)
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WSsecurity protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 88-106. Springer, Heidelberg (2006)
  • 22
    • 35048821943 scopus 로고    scopus 로고
    • Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, 3188, pp. 197-222. Springer, Heidelberg (2004)
    • Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197-222. Springer, Heidelberg (2004)
  • 23
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • June
    • Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82-96 (June 2001)
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 24
    • 84958749546 scopus 로고    scopus 로고
    • Blanchet, B.: From secrecy to authenticity in security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 342-359. Springer, Heidelberg (2002)
    • Blanchet, B.: From secrecy to authenticity in security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 342-359. Springer, Heidelberg (2002)
  • 25
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • May
    • Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: 2004 IEEE Symposium on Security and Privacy, pp. 86-100 (May 2004)
    • (2004) 2004 IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 26
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • May
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 2006 IEEE Symposium on Security and Privacy, pp. 140-154 (May 2006)
    • (2006) 2006 IEEE Symposium on Security and Privacy , pp. 140-154
    • Blanchet, B.1
  • 28
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Gordon, A.D, ed, Foundations of Software Science and Computation Structures: 6th International Conference, FOSSACS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS, Warsaw, Poland, April 7-11, Springer, Heidelberg () 2003
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) Foundations of Software Science and Computation Structures: 6th International Conference, FOSSACS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 29
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 33
    • 84947418221 scopus 로고    scopus 로고
    • Bolignano, D.: Towards a mechanization of cryptographic protocol verification. In: Grumberg, O. (ed.) CAV 1997. LNCS, 1254, pp. 131-142. Springer, Heidelberg (1997)
    • Bolignano, D.: Towards a mechanization of cryptographic protocol verification. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 131-142. Springer, Heidelberg (1997)
  • 34
    • 0036308321 scopus 로고    scopus 로고
    • Proof techniques for cryptographic processes
    • Boreale, M., De Nicola, R., Pugliese, R.: Proof techniques for cryptographic processes. SIAM J. Comput. 31(3), 947-986 (2001)
    • (2001) SIAM J. Comput , vol.31 , Issue.3 , pp. 947-986
    • Boreale, M.1    De Nicola, R.2    Pugliese, R.3
  • 35
    • 35048863862 scopus 로고    scopus 로고
    • Symbolic bisimulation in the spi calculus
    • Gardner, P, Yoshida, N, eds, CONCUR 2004, Springer, Heidelberg
    • Borgström, J., Briais, S., Nestmann, U.: Symbolic bisimulation in the spi calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 161-176. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3170 , pp. 161-176
    • Borgström, J.1    Briais, S.2    Nestmann, U.3
  • 36
    • 84944052768 scopus 로고    scopus 로고
    • On bisimulations for the spi calculus
    • Kirchner, H, Ringeissen, C, eds, AMAST 2002, Springer, Heidelberg
    • Borgström, J., Nestmann, U.: On bisimulations for the spi calculus. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 287-303. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2422 , pp. 287-303
    • Borgström, J.1    Nestmann, U.2
  • 37
    • 0000523051 scopus 로고
    • A logic of authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report, February
    • Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A 426, 233-271 (1989) (A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989)
    • (1989) Proceedings of the Royal Society of London , vol.A 426 , Issue.39 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 38
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3), 423-482 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 41
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM 24(7), 533-535 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.7 , pp. 533-535
    • Denning, D.E.1    Sacco, G.M.2
  • 45
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 46
    • 38049015738 scopus 로고    scopus 로고
    • Freier, A.O, Karlton, P, Kocher, P.C, The SSL protocol: Version 3.0 November 1996
    • Freier, A.O., Karlton, P., Kocher, P.C.: The SSL protocol: Version 3.0 (November 1996), http://www.mozilla.org/projects/security/pki/nss/ssl/draft302. txt
  • 51
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
    • Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 55
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer, R.A., Meadows, C., Millen, J.K.: Three systems for cryptographic protocol analysis. Journal of Cryptology 7(2), 79-130 (1994)
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.A.1    Meadows, C.2    Millen, J.K.3
  • 57
    • 23144432349 scopus 로고    scopus 로고
    • Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
    • Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
  • 59
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • May
    • Laud, P.: Symmetric encryption in automatic analyses for confidentiality against active adversaries. In: 2004 IEEE Symposium on Security and Privacy, pp. 71-85 (May 2004)
    • (2004) 2004 IEEE Symposium on Security and Privacy , pp. 71-85
    • Laud, P.1
  • 62
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 64
    • 0032684740 scopus 로고    scopus 로고
    • I/O automaton models and proofs for shared-key communication systems
    • Lynch, N.: I/O automaton models and proofs for shared-key communication systems. In: 12th IEEE Computer Security Foundations Workshop, pp. 14-29 (1999)
    • (1999) 12th IEEE Computer Security Foundations Workshop , pp. 14-29
    • Lynch, N.1
  • 66
    • 0004256761 scopus 로고
    • PhD thesis, Georgia Institute of Technology February
    • Merritt, M.J.: Cryptographic Protocols. PhD thesis, Georgia Institute of Technology (February 1983)
    • (1983) Cryptographic Protocols
    • Merritt, M.J.1
  • 67
    • 35048899313 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
  • 68
    • 0003700417 scopus 로고
    • Kerberos authentication and authorization system, Project Athena technical plan, section E.2.1
    • Technical report. MIT, Cambridge
    • Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system, Project Athena technical plan, section E.2.1. Technical report. MIT, Cambridge (1987)
    • (1987)
    • Miller, S.P.1    Neuman, B.C.2    Schiller, J.I.3    Saltzer, J.H.4
  • 72
    • 0037400687 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Monniaux, D.: Abstracting cryptographic protocols with tree automata. Science of Computer Programming 47(2-3), 177-202 (2003)
    • (2003) Science of Computer Programming , vol.47 , Issue.2-3 , pp. 177-202
    • Monniaux, D.1
  • 74
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 76
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 77
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • Walukiewicz, I, ed, FOSSACS 2004, Springer, Heidelberg
    • Ramanathan, A., Mitchell, J., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol. 2987, pp. 468-483. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2987 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.2    Scedrov, A.3    Teague, V.4
  • 79
    • 0029721958 scopus 로고    scopus 로고
    • Limitations on design principles for public key protocols
    • Syverson, P.: Limitations on design principles for public key protocols. In: 1996 IEEE Symposium on Security and Privacy, pp. 62-73 (1996)
    • (1996) 1996 IEEE Symposium on Security and Privacy , pp. 62-73
    • Syverson, P.1
  • 81
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • Woo, T.Y.C., Lam, S.S.: Authentication for distributed systems. Computer 25(1), 39-52 (1992)
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 82
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. Operating Systems Review 28(3), 24-37 (1994)
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.