메뉴 건너뛰기




Volumn 4691 LNCS, Issue , 2007, Pages 80-95

Formalizing and analyzing sender invariance

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ELECTRIC NETWORK ANALYSIS; IDENTIFICATION (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 38049169637     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 1
    • 84957795309 scopus 로고    scopus 로고
    • Abadi, M.: Private Authentication. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 27-40. Springer, Heidelberg (2003)
    • Abadi, M.: Private Authentication. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 27-40. Springer, Heidelberg (2003)
  • 3
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Heàm, P.C., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005), http://www.avispa-project.org
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Heàm, P.C., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005), http://www.avispa-project.org
  • 5
    • 18744415053 scopus 로고    scopus 로고
    • Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols
    • ACM Press, New York
    • Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: CCS'03. Proceedings of CCS'03, pp. 335-344. ACM Press, New York (2003)
    • (2003) CCS'03. Proceedings of CCS'03 , pp. 335-344
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 6
    • 33646262130 scopus 로고    scopus 로고
    • Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835, pp. 549-564. Springer, Heidelberg (2005)
    • Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 549-564. Springer, Heidelberg (2005)
  • 7
    • 19744367735 scopus 로고    scopus 로고
    • Basin, D., Mödersheim, S., Viganò, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security 4(3), 181-208 (2005)
    • Basin, D., Mödersheim, S., Viganò, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security 4(3), 181-208 (2005)
  • 8
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 12
    • 38049123287 scopus 로고    scopus 로고
    • Dierks, T., Allen, C.: RFC2246 - The TLS Protocol Version 1 (January 1999)
    • Dierks, T., Allen, C.: RFC2246 - The TLS Protocol Version 1 (January 1999)
  • 15
    • 38049134169 scopus 로고    scopus 로고
    • Johnson, D., Perkins, C., Arkko, J.: RFC3775 - Mobility Support in IPv6 (June 2004)
    • Johnson, D., Perkins, C., Arkko, J.: RFC3775 - Mobility Support in IPv6 (June 2004)
  • 16
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press, Los Alamitos
    • Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of CSFW'97, pp. 31-43. IEEE Computer Society Press, Los Alamitos (1997)
    • (1997) Proceedings of CSFW'97 , pp. 31-43
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.