메뉴 건너뛰기




Volumn 4798 LNAI, Issue , 2007, Pages 30-38

Identifying dependency between secure messages for protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; IDENTIFICATION (CONTROL SYSTEMS); INFORMATION ANALYSIS; SECURITY OF DATA;

EID: 38149000259     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76719-0_7     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 2
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1), 44-54 (2003)
    • (2003) IEEE Journal on Selected Areas in Communications , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 3
    • 0001772130 scopus 로고    scopus 로고
    • Secret by typing in security protocols
    • Abadi, M.: Secret by typing in security protocols. Journal of the ACM 46(5), 749-786 (1999)
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 8
    • 38149111638 scopus 로고    scopus 로고
    • http://b-course.cs.helsinki.fi/obc/
  • 9
    • 38149056163 scopus 로고    scopus 로고
    • http://www.deakin.edu.au/qifengch/ksem/dependence.doc
  • 10
    • 33745670893 scopus 로고    scopus 로고
    • Chen, Q., Chen, Y., Zhang, S., Zhang, C.Q.: Detecting Collusion Attacks in Security Protocols. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, 3841, pp. 297-306. Springer, Heidelberg (2006)
    • Chen, Q., Chen, Y., Zhang, S., Zhang, C.Q.: Detecting Collusion Attacks in Security Protocols. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 297-306. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.