메뉴 건너뛰기




Volumn , Issue , 2008, Pages 66-76

On the protocol composition logic PCL

Author keywords

Composition; Logic; Security protocol analysis

Indexed keywords

FORMAL SECURITY; PROTOCOL COMPOSITION; SECURITY PROTOCOL ANALYSIS;

EID: 48949094875     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368324     Document Type: Conference Paper
Times cited : (23)

References (14)
  • 2
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Computer Security - ESORICS 2003
    • D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In ESORICS, volume 2808 of Lecture Notes in Computer Science, pages 253-270. Springer-Verlag, 2003. (Pubitemid 37311874)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2808 , pp. 253-270
    • Basin, D.1    Modersheim, S.2    Vigano, L.3
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society, 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 5
    • 38049082991 scopus 로고    scopus 로고
    • A generalization of DDH with applications to protocol analysis and computational soundness
    • A. J. Menezes, editor, of Lecture Notes in Computer Science, Springer-Verlag, August
    • E. Bresson, Y. Lakhnech, L. Mazaré, and B. Warinschi. A generalization of DDH with applications to protocol analysis and computational soundness. In A. J. Menezes, editor, Proc. of Crypto '07, volume 4622 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, August 2007.
    • (2007) Proc. of Crypto '07 , vol.4622 , pp. 482-499
    • Bresson, E.1    Lakhnech, Y.2    Mazaré, L.3    Warinschi, B.4
  • 8
    • 33750487822 scopus 로고    scopus 로고
    • Injective synchronisation: An extension of the authentication hierarchy
    • C. Cremers, S. Mauw, and E. de Vink. Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 2006.
    • (2006) Theoretical Computer Science
    • Cremers, C.1    Mauw, S.2    De Vink, E.3
  • 12
    • 24144437949 scopus 로고    scopus 로고
    • Secure protocol composition
    • Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics
    • A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. Secure protocol composition. Electron. Notes Theor. Comput. Sci., 83, 2004. Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics.
    • Electron. Notes Theor. Comput. Sci. , vol.83 , pp. 2004
    • Datta, A.1    Derek, A.2    Mitchell, J.3    Pavlovic, D.4
  • 13
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system and compositional logic for security protocols. Journal of Computer Security, 13 (3):423-482, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.3    Pavlovic, D.4
  • 14
    • 33847655213 scopus 로고    scopus 로고
    • Protocol Composition Logic (PCL)
    • Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin. Editors: L. Cardelli, M. Fiore, and G
    • A. Datta, A. Derek, J. Mitchell, and A. Roy. Protocol Composition Logic (PCL). Electron. Notes Theor. Comput. Sci., 172:311-358, 2007. Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin. Editors: L. Cardelli, M. Fiore, and G.
    • (2007) Electron. Notes Theor. Comput. Sci. , vol.172 , pp. 311-358
    • Datta, A.1    Derek, A.2    Mitchell, J.3    Roy, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.