메뉴 건너뛰기




Volumn 4680 LNCS, Issue , 2007, Pages 238-251

Intrusion attack tactics for the model checking of e-commerce security guarantees

Author keywords

e commerce protocols; Intrusion attacks; Model checking; SPIN

Indexed keywords

ELECTRONIC COMMERCE; INFORMATION RETRIEVAL; MESSAGE PASSING; MODEL CHECKING; NETWORK PROTOCOLS;

EID: 38349029320     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75101-4_22     Document Type: Conference Paper
Times cited : (13)

References (27)
  • 3
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • SafaviNaini, R, Pieprzyk, J.P, eds, ASIACRYPT 1994, Springer, Heidelberg
    • Meadows, C.A.: Formal verification of cryptographic protocols: A survey. In: SafaviNaini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133-150. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.917 , pp. 133-150
    • Meadows, C.A.1
  • 5
    • 84962060059 scopus 로고    scopus 로고
    • The logic of authentication protocols
    • Focardi, R, Gorrieri, R, eds, Foundations of Security Analysis and Design, Springer, Heidelberg
    • Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 63-137. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2171 , pp. 63-137
    • Syverson, P.1    Cervesato, I.2
  • 8
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair non-repudiation protocols
    • Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Computer Communications 25/17, 1606-1621 (2002)
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 9
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Shmatikov, V., Mitchell, J.C.: Finite-state analysis of two contract signing protocols. Theoretical Computer Science 283, 419-450 (2002)
    • (2002) Theoretical Computer Science , vol.283 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 11
    • 84979076059 scopus 로고    scopus 로고
    • Payword and Micromint: Two simple micropayment schemes
    • Lomas, M, ed, Security Protocols, Springer, Heidelberg
    • Rivest, R.L., Shamir, A.: Payword and Micromint: Two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 69-87. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1189 , pp. 69-87
    • Rivest, R.L.1    Shamir, A.2
  • 15
    • 0029484376 scopus 로고
    • Modeling and verifying key-exchange protocols using CSP and FDR
    • IEEE Computer Society, Los Alamitos
    • Roscoe, A.W.: Modeling and verifying key-exchange protocols using CSP and FDR. In: Proc. of the 8th IEEE Computer Security Foundations Workshop, pp. 98-107. IEEE Computer Society, Los Alamitos (1995)
    • (1995) Proc. of the 8th IEEE Computer Security Foundations Workshop , pp. 98-107
    • Roscoe, A.W.1
  • 18
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE Computer Society, Los Alamitos
    • Lowe, G.: Casper: a compiler for the analysis of security protocols. In: Proc. of the IEEE Computer Security Foundations Workshop, pp. 18-30. IEEE Computer Society, Los Alamitos (1997)
    • (1997) Proc. of the IEEE Computer Security Foundations Workshop , pp. 18-30
    • Lowe, G.1
  • 19
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Meadows, C., Kemmerer, R., Millen, J.: Three systems for cryptographic protocol analysis. Journal of Cryptology 7/2, 79-130 (1994)
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Meadows, C.1    Kemmerer, R.2    Millen, J.3
  • 20
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • Gritzalis, S., Spinellis, D., Georgiadis, P.: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 22, 697-709 (1999)
    • (1999) Computer Communications , vol.22 , pp. 697-709
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 21
    • 38349006963 scopus 로고    scopus 로고
    • Basin, D., Modersheim, S., Vigano, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)
    • Basin, D., Modersheim, S., Vigano, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)
  • 23
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model-checking of Security Protocols
    • IEEE Computer Society Press, Los Alamitos
    • Lowe, G.: Towards a completeness result for model-checking of Security Protocols. In: Proc. of the 11th Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (1998)
    • (1998) Proc. of the 11th Computer Security Foundations Workshop
    • Lowe, G.1
  • 24
    • 38349018992 scopus 로고    scopus 로고
    • Clark, J, Jacob, J, A survey of authentication protocol literature: version 1.0, Technical Report, University of York 1997
    • Clark, J., Jacob, J.: A survey of authentication protocol literature: version 1.0, Technical Report, University of York (1997)
  • 26
    • 85063324360 scopus 로고
    • Cryptographic protocol flaws - Know your enemy
    • IEEE Computer Society, Los Alamitos
    • Carlsen, U.: Cryptographic protocol flaws - Know your enemy. In: Proc. of the 7th IEEE Computer Security Foundations Workshop, pp. 192-200. IEEE Computer Society, Los Alamitos (1994)
    • (1994) Proc. of the 7th IEEE Computer Security Foundations Workshop , pp. 192-200
    • Carlsen, U.1
  • 27
    • 0003602325 scopus 로고
    • The MD5 Message-Digest Algorithm
    • RFC 1321
    • Rivest, R.L.: The MD5 Message-Digest Algorithm. In: Internet informational RFC 1321 (1992)
    • (1992) Internet informational
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.