메뉴 건너뛰기




Volumn 4533 LNCS, Issue , 2007, Pages 20-35

Intruders with caps

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; MATHEMATICAL MODELS; PROBLEM SOLVING; SET THEORY;

EID: 38049162024     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73449-9_4     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2), 2-32 (2006)
    • (2006) Theor. Comput. Sci , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 2
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • Amadio, R., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
    • (2003) Theor. Comput. Sci , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.1    Lugiez, D.2    Vanackère, V.3
  • 3
    • 38049113781 scopus 로고    scopus 로고
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps (2007) http ://www.univ-orleans.fr/lifo/prodsci/rapports/RR/RR2007/ RR-2207-02.ps
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps (2007) http ://www.univ-orleans.fr/lifo/prodsci/rapports/RR/RR2007/ RR-2207-02.ps
  • 4
    • 22944445210 scopus 로고    scopus 로고
    • SATMC: A SAT-based Model Checker for Security Protocols
    • Alferes, J.J, Leite, J.A, eds, JELIA 2004, Springer, Heidelberg
    • Armando, A., Compagna, L.: SATMC: a SAT-based Model Checker for Security Protocols. In: Alferes, J.J., Leite, J.A. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004)
    • (2004) LNCS (LNAI , vol.3229 , pp. 730-733
    • Armando, A.1    Compagna, L.2
  • 7
    • 84936902338 scopus 로고    scopus 로고
    • Book, R.V., Otto, F.: The verifiability of two-party protocols. In: EUROCRYPT, pp. 254-260 (1985)
    • Book, R.V., Otto, F.: The verifiability of two-party protocols. In: EUROCRYPT, pp. 254-260 (1985)
  • 9
    • 24944569389 scopus 로고    scopus 로고
    • Comon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467, pp. 294-307. Springer, Heidelberg (2005)
    • Comon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294-307. Springer, Heidelberg (2005)
  • 10
    • 35248836596 scopus 로고    scopus 로고
    • Easy Intruder Deductions
    • Dershowitz, N, ed, Verification: Theory and Practice, Springer, Heidelberg
    • Comon-Lundh, H., Treinen, R.: Easy Intruder Deductions. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol. 2772, pp. 225-242. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2772 , pp. 225-242
    • Comon-Lundh, H.1    Treinen, R.2
  • 14
    • 84974751548 scopus 로고
    • Regular tree languages and rewrite systems
    • Gilleron, R., Tison, S.: Regular tree languages and rewrite systems. Fundamenta Informaticae 24, 157-176 (1995)
    • (1995) Fundamenta Informaticae , vol.24 , pp. 157-176
    • Gilleron, R.1    Tison, S.2
  • 15
    • 84976811006 scopus 로고
    • Confluent reductions: Abstract properties and applications to term rewriting systems
    • Huet, G.P.: Confluent reductions: Abstract properties and applications to term rewriting systems. Journal of the ACM 27(4), 797-821 (1980)
    • (1980) Journal of the ACM , vol.27 , Issue.4 , pp. 797-821
    • Huet, G.P.1
  • 16
    • 0031505860 scopus 로고    scopus 로고
    • On the unification problem for Cartesian Closed Categories
    • Narendran, P., Pfenning, F., Statman, R.: On the unification problem for Cartesian Closed Categories. Journal of Symbolic Logic 62(2), 636-647 (1997)
    • (1997) Journal of Symbolic Logic , vol.62 , Issue.2 , pp. 636-647
    • Narendran, P.1    Pfenning, F.2    Statman, R.3
  • 17
    • 23144457408 scopus 로고    scopus 로고
    • Nesi, M., Rucci, G.: Formalizing and analyzing the Needham-Schroeder symmetrickey protocol by rewriting. Electr. Notes Theor. Comput. Sci. 135(1), 95-114 (2005)
    • Nesi, M., Rucci, G.: Formalizing and analyzing the Needham-Schroeder symmetrickey protocol by rewriting. Electr. Notes Theor. Comput. Sci. 135(1), 95-114 (2005)
  • 18
    • 84957639842 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols
    • Ganzinger, H, ed, Automated Deduction, CADE-16, Springer, Heidelberg
    • Weidenbach, C.: Towards an automatic analysis of security protocols. In: Ganzinger, H. (ed.) Automated Deduction - CADE-16. LNCS (LNAI), vol. 1632, pp. 378-382. Springer, Heidelberg (1999)
    • (1999) LNCS (LNAI , vol.1632 , pp. 378-382
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.