메뉴 건너뛰기




Volumn 4855 LNCS, Issue , 2007, Pages 121-132

Key substitution in the symbolic analysis of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MESSAGE PASSING; NETWORK PROTOCOLS; VERIFICATION;

EID: 38349039345     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77050-3_10     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 1
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • Amadio, R., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
    • (2003) Theor. Comput. Sci , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.1    Lugiez, D.2    Vanackère, V.3
  • 2
    • 38049162024 scopus 로고    scopus 로고
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, Springer, Heidelberg (2007)
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, Springer, Heidelberg (2007)
  • 3
    • 38149136172 scopus 로고    scopus 로고
    • Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
    • Copenhagen, Denmark July 25-26
    • Armando, A., Compagna, L.: Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In: Foundation of Computer Security & Verification Workshops, Copenhagen, Denmark (July 25-26, 2002)
    • (2002) Foundation of Computer Security & Verification Workshops
    • Armando, A.1    Compagna, L.2
  • 6
    • 84956866842 scopus 로고    scopus 로고
    • Wilson, S.B., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, 1560, pp. 154-170. Springer, Heidelberg (1999)
    • Wilson, S.B., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154-170. Springer, Heidelberg (1999)
  • 7
    • 38348999962 scopus 로고    scopus 로고
    • Chevalier, Y., Kourjieh, M.: Key substitution in the symbolic analysis of cryptographic protocols. Technical report, IRIT (2007)
    • Chevalier, Y., Kourjieh, M.: Key substitution in the symbolic analysis of cryptographic protocols. Technical report, IRIT (2007)
  • 8
    • 38049024456 scopus 로고    scopus 로고
    • Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Services Security. In: Konev, B., Wolter, F. (eds.) Frocos 2007. LNCS (LNAI), 4720, pp. 133-147. Springer, Heidelberg (2007)
    • Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Services Security. In: Konev, B., Wolter, F. (eds.) Frocos 2007. LNCS (LNAI), vol. 4720, pp. 133-147. Springer, Heidelberg (2007)
  • 9
    • 26444458330 scopus 로고    scopus 로고
    • Combining Intruder Theories
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Chevalier, Y., Rusinowitch, M.: Combining Intruder Theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 639-651. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 639-651
    • Chevalier, Y.1    Rusinowitch, M.2
  • 11
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2), 281-308 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 12
    • 84958952153 scopus 로고    scopus 로고
    • Hirose, S., Yoshida, S.: An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 135-148. Springer, Heidelberg (1998)
    • Hirose, S., Yoshida, S.: An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 135-148. Springer, Heidelberg (1998)
  • 13
    • 85035020357 scopus 로고
    • Canonical forms and unification
    • Bibel, W, Kowalski, R, eds, Springer, Heidelberg
    • Hullot, J.M.: Canonical forms and unification. In: Bibel, W., Kowalski, R. (eds.) Conference on Automated Deduction, vol. 87, pp. 318-334. Springer, Heidelberg (1980)
    • (1980) Conference on Automated Deduction , vol.87 , pp. 318-334
    • Hullot, J.M.1
  • 14
    • 0041052430 scopus 로고
    • Simple word problems in universal algebras
    • Siekmann, J, Wrightson, G, eds, Classical Papers on Computational Logic 1967-1970, pp, Springer, Heidelberg
    • Knuth, D.E., Bendix, P.B.: Simple word problems in universal algebras. In: Siekmann, J., Wrightson, G. (eds.) Automation of Reasoning 2: Classical Papers on Computational Logic 1967-1970, pp. 342-376. Springer, Heidelberg (1983)
    • (1983) Automation of Reasoning , vol.2 , pp. 342-376
    • Knuth, D.E.1    Bendix, P.B.2
  • 15
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: an overview. Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 16
    • 3843066626 scopus 로고    scopus 로고
    • Menezes, A., Smart, N.P.: Security of Signature Schemes in a Multi-User Setting. Des. Codes Cryptography 33(3), 261-274 (2004)
    • Menezes, A., Smart, N.P.: Security of Signature Schemes in a Multi-User Setting. Des. Codes Cryptography 33(3), 261-274 (2004)
  • 17
    • 26444580274 scopus 로고    scopus 로고
    • Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 138-150. Springer, Heidelberg (2005)
    • Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 138-150. Springer, Heidelberg (2005)
  • 18
    • 84957640213 scopus 로고    scopus 로고
    • Towards an Automatic Analysis of Security Protocols in FirstOrder Logic
    • Ganzinger, H, ed, Automated Deduction, CADE-16, Springer, Heidelberg
    • Weidenbach, C.: Towards an Automatic Analysis of Security Protocols in FirstOrder Logic. In: Ganzinger, H. (ed.) Automated Deduction - CADE-16. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
    • (1999) LNCS (LNAI , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.