메뉴 건너뛰기




Volumn 4855 LNCS, Issue , 2007, Pages 376-387

Bounding messages for free in security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; NETWORK PROTOCOLS; SECURITY SYSTEMS; VERIFICATION;

EID: 38349010575     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77050-3_31     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 1
    • 38349077541 scopus 로고    scopus 로고
    • Arapinis, M., Duflot, M.: Bounding messages for free in security protocols (extended version) (2007), http://www.arapinis.org/publications/ fsttcs07ext.pdf
    • Arapinis, M., Duflot, M.: Bounding messages for free in security protocols (extended version) (2007), http://www.arapinis.org/publications/ fsttcs07ext.pdf
  • 2
    • 13644264990 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination. TCS
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. TCS: Theoretical Computer Science 333 (2005)
    • (2005) Theoretical Computer Science , vol.333
    • Blanchet, B.1    Podelski, A.2
  • 3
    • 38349003859 scopus 로고    scopus 로고
    • Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 98 (2001)
    • Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 98 (2001)
  • 4
    • 38349000750 scopus 로고    scopus 로고
    • Safely composing security protocols
    • Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
    • Cortier, V., Delaître, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4855
    • Cortier, V.1    Delaître, J.2    Delaune, S.3
  • 6
    • 26944465513 scopus 로고    scopus 로고
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M., Vigneron, L.: Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, 2803, pp. 128-141. Springer, Heidelberg (2003)
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M., Vigneron, L.: Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, vol. 2803, pp. 128-141. Springer, Heidelberg (2003)
  • 7
    • 38349046033 scopus 로고    scopus 로고
    • Cortier, V, Zalinescu, E, Deciding key cycles for security protocols. In
    • Cortier, V., Zalinescu, E.: Deciding key cycles for security protocols. In:
  • 8
    • 38349043013 scopus 로고    scopus 로고
    • Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), 4246, pp. 317-331. Springer, Heidelberg (2006)
    • Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), vol. 4246, pp. 317-331. Springer, Heidelberg (2006)
  • 10
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security 11(2), 217-244 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 11
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Lowe, G.1
  • 15
    • 35248886574 scopus 로고    scopus 로고
    • Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FST TCS 2003. LNCS, 2914, Springer, Heidelberg (2003)
    • Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FST TCS 2003. LNCS, vol. 2914, Springer, Heidelberg (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.