메뉴 건너뛰기




Volumn 4591 LNCS, Issue , 2007, Pages 538-557

Integrating verification, testing, and learning for cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BIOMETRICS; FORMAL METHODS; LEARNING SYSTEMS; NETWORK PROTOCOLS; VERIFICATION;

EID: 38149050532     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73210-5_28     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Inf. Comput. 148(1), 1-70 (1999)
    • (1999) Inf. Comput , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6(1-2), 53-84 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 5
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 6
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 7
    • 0346955916 scopus 로고    scopus 로고
    • The coinductive approach to verifying cryptographic protocols
    • Wirsing, M, Pattinson, D, Hennicker, R, eds, Recent Trends in Algebraic Development Techniques, Springer, Heidelberg
    • Hughes, J., Warnier, M.: The coinductive approach to verifying cryptographic protocols. In: Wirsing, M., Pattinson, D., Hennicker, R. (eds.) Recent Trends in Algebraic Development Techniques. LNCS, vol. 2755, pp. 268-283. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2755 , pp. 268-283
    • Hughes, J.1    Warnier, M.2
  • 8
    • 38149002937 scopus 로고    scopus 로고
    • Gunter, E.L., Felty, A.P. (eds.): TPHOLs 1997. LNCS, 1275, pp. 19-22. Springer, Heidelberg (1997)
    • Gunter, E.L., Felty, A.P. (eds.): TPHOLs 1997. LNCS, vol. 1275, pp. 19-22. Springer, Heidelberg (1997)
  • 9
    • 19044390971 scopus 로고    scopus 로고
    • Denker, G., Millen, J.K.: Modeling group communication protocols using multiset term rewriting. Electr. Notes Theor. Comput. Sci., 71 (2002)
    • Denker, G., Millen, J.K.: Modeling group communication protocols using multiset term rewriting. Electr. Notes Theor. Comput. Sci., vol. 71 (2002)
  • 10
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • McAlleste, D.A, ed, Automated Deduction, CADE-17, Springer, Heidelberg
    • Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAlleste, D.A. (ed.) Automated Deduction - CADE-17. LNCS, vol. 1831, pp. 271-290. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 11
    • 1442316806 scopus 로고    scopus 로고
    • Pattern-based abstraction for verifying secrecy in protocols
    • Garavel, H, Hatcliff, J, eds, ETAPS 2003 and TACAS 2003, Springer, Heidelberg
    • Bozga, L., Lakhnech, Y., Périn, M.: Pattern-based abstraction for verifying secrecy in protocols. In: Garavel, H., Hatcliff, J. (eds.) ETAPS 2003 and TACAS 2003. LNCS, vol. 2619, pp. 299-314. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2619 , pp. 299-314
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 12
    • 0037400687 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Monniaux, D.: Abstracting cryptographic protocols with tree automata. Sci. Comput. Program. 47(2-3), 177-202 (2003)
    • (2003) Sci. Comput. Program , vol.47 , Issue.2-3 , pp. 177-202
    • Monniaux, D.1
  • 13
    • 4243317658 scopus 로고
    • Conformance Testing Methodology and Framework
    • ISO/IEC 9646
    • ISO/IEC 9646. Conformance Testing Methodology and Framework (1992)
    • (1992)
  • 15
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
    • Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 19
    • 38149012143 scopus 로고    scopus 로고
    • Technical advisory group on Machine-Readable travel documents. Pki for machine-readable travel documents, version 1.1. Technical report, International Civil Aviation Organization October 2004
    • Technical advisory group on Machine-Readable travel documents. Pki for machine-readable travel documents, version 1.1. Technical report, International Civil Aviation Organization (October 2004)
  • 20
    • 0001383866 scopus 로고    scopus 로고
    • Introduction to IO automata
    • Lynch, N., Tuttle, M.: Introduction to IO automata. CWI Quarterly, vol. 3(2) (1999)
    • (1999) CWI Quarterly , vol.3 , Issue.2
    • Lynch, N.1    Tuttle, M.2
  • 21
    • 0024640163 scopus 로고
    • Linda in context
    • Carriero, N., Gelernter, D.: Linda in context. Commun. ACM 32(4), 444-458 (1989)
    • (1989) Commun. ACM , vol.32 , Issue.4 , pp. 444-458
    • Carriero, N.1    Gelernter, D.2
  • 23
    • 84928563923 scopus 로고    scopus 로고
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 76-87. Springer, Heidelberg (2003)
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76-87. Springer, Heidelberg (2003)
  • 24
    • 0842331202 scopus 로고    scopus 로고
    • Gaudel, M.-C., James, P.R.: Testing algebraic data types and processes: A unifying theory. Formal Asp. Comput. 10(5-6), 436-451 (1998)
    • Gaudel, M.-C., James, P.R.: Testing algebraic data types and processes: A unifying theory. Formal Asp. Comput. 10(5-6), 436-451 (1998)
  • 25
    • 84976832596 scopus 로고
    • Inference of reversible languages
    • Angluin, D.: Inference of reversible languages. Journal of the ACM 29(3), 741-765 (1982)
    • (1982) Journal of the ACM , vol.29 , Issue.3 , pp. 741-765
    • Angluin, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.