메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 166-177

Specifying and verifying hardware for tamper-resistant software

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE; RECONFIGURABLE HARDWARE; VERIFICATION;

EID: 4444322842     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199335     Document Type: Conference Paper
Times cited : (42)

References (27)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Expanded version available as SRC Research Report 149 (January 1998)
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 143:1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
    • (1999) Information and Computation , vol.143 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 2
    • 0026154452 scopus 로고
    • The existence ofrefinement mappings
    • M. Abadi and L.Lamport. The existence ofrefinement mappings. Theoretical Computer Science, 82(2):253-284, 1991.
    • (1991) Theoretical Computer Science , vol.82 , Issue.2 , pp. 253-284
    • Abadi, M.1    Lamport, L.2
  • 3
    • 84954417747 scopus 로고
    • XOR MAC's: New methods for message authentication using finite pseudorandom functions
    • CRYPTO'95
    • M. Bellare, R. Guerin, and P. Rogaway. XOR MAC's: New methods for message authentication using finite pseudorandom functions. CRYPTO'95, Lecture Notes in Computer Science, 963, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 6
    • 0000877763 scopus 로고    scopus 로고
    • A type system for object initialization in the java bytecode language
    • Nov
    • S. Freund and J. Mitchell. A type system for object initialization in the java bytecode language. ACM Transactions on Programming Languages and Systems, 21(6):1196-1250, Nov. 1999.
    • (1999) ACM Transactions on Programming Languages and Systems , vol.21 , Issue.6 , pp. 1196-1250
    • Freund, S.1    Mitchell, J.2
  • 8
    • 85084163735 scopus 로고    scopus 로고
    • The design ofa cryptographic security architecture
    • P. Gutmann. The design ofa cryptographic security architecture. In The Usenix Security Symposium, 1999.
    • (1999) The Usenix Security Symposium
    • Gutmann, P.1
  • 19
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • IEEE Computer Soc Press
    • A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In CSFW VIII, page 98. IEEE Computer Soc Press, 1995.
    • (1995) CSFW VIII , pp. 98
    • Roscoe, A.W.1
  • 24
    • 84958045366 scopus 로고    scopus 로고
    • Using a high-performance, programmable secure coprocessor
    • Feb
    • S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89, Feb. 1998.
    • (1998) Financial Cryptography , pp. 73-89
    • Smith, S.W.1    Palmer, E.R.2    Weingart, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.