메뉴 건너뛰기




Volumn 4790 LNAI, Issue , 2007, Pages 226-241

Operational and epistemic approaches to protocol analysis: Bridging the gap

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; AD HOC NETWORKS; DATA STRUCTURES; SEMANTICS; TEMPORAL LOGIC;

EID: 38349003243     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75560-9_18     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1999)
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 33751177881 scopus 로고    scopus 로고
    • Logics for insecure communication
    • Baltag, A.: Logics for insecure communication. In: Proc. TARK 2001, pp. 111-121 (2001)
    • (2001) Proc. TARK 2001 , pp. 111-121
    • Baltag, A.1
  • 4
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • Abadi, M, de Alfaro, L, eds, CONCUR 2005, Springer, Heidelberg
    • Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171-185. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 7
    • 0021465083 scopus 로고
    • A theory of communicating sequential processes
    • Brookes, D., Hoare, C.A.R., Roscoe, A.W.: A theory of communicating sequential processes. Journal of the ACM 31(3), 560-599 (1984)
    • (1984) Journal of the ACM , vol.31 , Issue.3 , pp. 560-599
    • Brookes, D.1    Hoare, C.A.R.2    Roscoe, A.W.3
  • 9
    • 33750486827 scopus 로고    scopus 로고
    • Caleiroa, C., Viganò, L., Basin, D.: On the semantics of Alice & Bob specifications of security protocols. TCS 367(1-2), 88-122 (2006)
    • Caleiroa, C., Viganò, L., Basin, D.: On the semantics of Alice & Bob specifications of security protocols. TCS 367(1-2), 88-122 (2006)
  • 10
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988)
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 11
    • 34548274193 scopus 로고    scopus 로고
    • A framework for automatically checking anonymity with mCRL
    • Proc. TGC
    • Chothia, T., Orzan, S.M., Pang, J., Dashti, M.T.: A framework for automatically checking anonymity with mCRL. In: Proc. TGC 2006, LNCS (2007)
    • (2006) LNCS
    • Chothia, T.1    Orzan, S.M.2    Pang, J.3    Dashti, M.T.4
  • 12
    • 38349078802 scopus 로고    scopus 로고
    • Operational and epistemic approaches to protocol analysis: Bridging the gap
    • 07-15, TU Eindhoven
    • Dechesne, F., Mousavi, M., Orzan, S.M.: Operational and epistemic approaches to protocol analysis: Bridging the gap. Tech. Rep. CS 07-15, TU Eindhoven (2007)
    • (2007) Tech. Rep. CS
    • Dechesne, F.1    Mousavi, M.2    Orzan, S.M.3
  • 13
    • 33846808999 scopus 로고    scopus 로고
    • van Eijck, J., Orzan, S.M.: Epistemic verification of anonymity. In: Proc. VODCA 2006. ENTCS, 168 (2006)
    • van Eijck, J., Orzan, S.M.: Epistemic verification of anonymity. In: Proc. VODCA 2006. ENTCS, vol. 168 (2006)
  • 16
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security, 483-514 (2005)
    • (2005) Journal of Computer Security , vol.483-514
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 18
    • 84893544909 scopus 로고    scopus 로고
    • Model checking knowledge and time
    • Bošnački, D, Leue, S, eds, Model Checking Software, Springer, Heidelberg
    • van der Hoek, W., Wooldridge, M.: Model checking knowledge and time. In: Bošnački, D., Leue, S. (eds.) Model Checking Software. LNCS, vol. 2318, pp. 95-111. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2318 , pp. 95-111
    • van der Hoek, W.1    Wooldridge, M.2
  • 19
    • 33751178365 scopus 로고    scopus 로고
    • Update semantics of security protocols
    • Hommersom, A., Meyer, J.-J., de Vink, E.P.: Update semantics of security protocols. Synthese 142, 229-267 (2004)
    • (2004) Synthese , vol.142 , pp. 229-267
    • Hommersom, A.1    Meyer, J.-J.2    de Vink, E.P.3
  • 20
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12(1), 3-36 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 21
    • 38349044285 scopus 로고    scopus 로고
    • Logical concepts in cryptography. Cryptology ePrint Archive
    • Report 2006/262
    • Kramer, S.: Logical concepts in cryptography. Cryptology ePrint Archive, Report 2006/262 (2006), http://eprint.iacr.org/2006/262
    • (2006)
    • Kramer, S.1
  • 22
    • 0003276138 scopus 로고
    • A Calculus of Communication Systems
    • Springer, Heidelberg
    • Milner, R.: A Calculus of Communication Systems. LNCS, vol. 92. Springer, Heidelberg (1980)
    • (1980) LNCS , vol.92
    • Milner, R.1
  • 23
    • 84896692700 scopus 로고    scopus 로고
    • Nielsen, M.: Reasoning about the past. In: Brim, L., Gruska, J., Zlatuška, J. (eds.) MFCS 1998. LNCS, 1450, pp. 117-128. Springer, Heidelberg (1998)
    • Nielsen, M.: Reasoning about the past. In: Brim, L., Gruska, J., Zlatuška, J. (eds.) MFCS 1998. LNCS, vol. 1450, pp. 117-128. Springer, Heidelberg (1998)
  • 25
    • 79953224019 scopus 로고    scopus 로고
    • Automatic verification of deontic interpreted systems by model checking via OBDD's
    • in Press
    • Raimondi, F., Lomuscio, A.: Automatic verification of deontic interpreted systems by model checking via OBDD's. Journal of Applied Logic (in Press, 2006)
    • (2006) Journal of Applied Logic
    • Raimondi, F.1    Lomuscio, A.2
  • 26
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, ESORICS 1996, Springer, Heidelberg
    • Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 198-218. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 27
    • 2942604383 scopus 로고    scopus 로고
    • Sequent calculi for process verification: Hennessy-Milner logic for an arbitrary GSOS
    • Simpson, A.K.: Sequent calculi for process verification: Hennessy-Milner logic for an arbitrary GSOS. Journal of Logic and Algebraic Programming, 60-61, 287-322
    • Journal of Logic and Algebraic Programming , vol.60-61 , pp. 287-322
    • Simpson, A.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.