메뉴 건너뛰기




Volumn 4994 LNAI, Issue , 2008, Pages 638-643

A logic programming based framework for security protocol verification

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; NETWORK SECURITY; PROBLEM SOLVING; VERIFICATION;

EID: 44649158296     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68123-6_70     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling Two Views of Cryptography (The Computaiotnal Soundness of Formal Encryption)
    • Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computaiotnal Soundness of Formal Encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 85006614284 scopus 로고    scopus 로고
    • Verifying Security Protocols as Planning in Logic Programming
    • Aiello, L.C., Massacci, F: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic 2(4), 542-580 (2001)
    • (2001) ACM Transactions on Computational Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.C.1    Massacci, F.2
  • 4
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically Sound and Machine-Assisted Verification of Security Protocols
    • Alt, H, Habib, M, eds, STACS 2003, Springer, Heidelberg
    • Backes, M., Jacobi, C.: Cryptographically Sound and Machine-Assisted Verification of Security Protocols. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 310-329. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2607 , pp. 310-329
    • Backes, M.1    Jacobi, C.2
  • 5
    • 44649159428 scopus 로고    scopus 로고
    • Baral, C, Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge
    • Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge
  • 6
    • 35248878662 scopus 로고    scopus 로고
    • Boyd, C., González Nieto, J.M.: Round-optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 161-174. Springer, Heidelberg (2002)
    • Boyd, C., González Nieto, J.M.: Round-optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161-174. Springer, Heidelberg (2002)
  • 7
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 8
    • 33845638668 scopus 로고    scopus 로고
    • Refuting Security Proofs for Tipartite Key Exchange with Model Checker in Planning Problem Setting
    • Choo, K.R.: Refuting Security Proofs for Tipartite Key Exchange with Model Checker in Planning Problem Setting. In: The 19th IEEE Computer Security Foundations Workshop CSFW 2006, pp. 297-308 (2006)
    • (2006) The 19th IEEE Computer Security Foundations Workshop , vol.CSFW 2006 , pp. 297-308
    • Choo, K.R.1
  • 9
    • 35048878818 scopus 로고    scopus 로고
    • Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 220-232. Springer, Heidelberg (2004)
    • Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004)
  • 12
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 13
    • 0002219322 scopus 로고    scopus 로고
    • An Attack on a Recursive Authentication Protocol: A Cautionary Tale
    • Ryan, P., Schneider, S.: An Attack on a Recursive Authentication Protocol: A Cautionary Tale. Information Processing Letters 65(15), 7-16 (1998)
    • (1998) Information Processing Letters , vol.65 , Issue.15 , pp. 7-16
    • Ryan, P.1    Schneider, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.