메뉴 건너뛰기




Volumn 5123 LNCS, Issue , 2008, Pages 414-418

The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

Author keywords

[No Author keywords available]

Indexed keywords


EID: 48949088211     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70545-1_38     Document Type: Conference Paper
Times cited : (577)

References (13)
  • 1
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE, Los Alamitos
    • Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 82-96. IEEE, Los Alamitos (2001)
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 2
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 4
    • 24944514681 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • Leue, S, Systä, T.J, eds, Scenarios: Models, Transformations and Tools, Springer, Heidelberg
    • Cremers, C., Mauw, S.: Operational semantics of security protocols. In: Leue, S., Systä, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol. 3466, pp. 66-89. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3466 , pp. 66-89
    • Cremers, C.1    Mauw, S.2
  • 6
    • 33847679489 scopus 로고    scopus 로고
    • Doghmi, S., Guttman, J.D., Thayer, F.: Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In: Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII). ENTCS, 173, pp. 85-102. Elsevier ScienceDirect, Amsterdam (2007)
    • Doghmi, S., Guttman, J.D., Thayer, F.: Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In: Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII). ENTCS, vol. 173, pp. 85-102. Elsevier ScienceDirect, Amsterdam (2007)
  • 9
    • 48949092479 scopus 로고    scopus 로고
    • Cremers, C., Lafourcade, P.: Comparing state spaces in automatic protocol verification. In: Proc. of the 7th Int. Workshop on Automated Verification of Critical Systems (AVoCS 2007). ENTCS (September 2007) (to appear)
    • Cremers, C., Lafourcade, P.: Comparing state spaces in automatic protocol verification. In: Proc. of the 7th Int. Workshop on Automated Verification of Critical Systems (AVoCS 2007). ENTCS (September 2007) (to appear)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.