메뉴 건너뛰기




Volumn 5123 LNCS, Issue , 2008, Pages 419-422

The CASPA tool: Causality-based abstraction for security protocol analysis - Tool paper

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; COMPUTER AIDED ANALYSIS; LAWS AND LEGISLATION;

EID: 48949100658     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70545-1_39     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1999)
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mödersheim, J.M.S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mödersheim, J.M.S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 5
    • 19744367735 scopus 로고    scopus 로고
    • Ofmc: A symbolic model checker for security protocols
    • Basin, D.A., Mödersheim, S., Viganò, L.: Ofmc: A symbolic model checker for security protocols. IJIS 4(3), 181-208 (2005)
    • (2005) IJIS , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.A.1    Mödersheim, S.2    Viganò, L.3
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE, Los Alamitos
    • Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 82-96. IEEE, Los Alamitos (2001)
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 7
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Gordon, A.D, ed, ETAPS 2003 and FOSSACS 2003, Springer, Heidelberg
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) ETAPS 2003 and FOSSACS 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 9
    • 33749381421 scopus 로고    scopus 로고
    • Boichut, Y., Genet, T.: Feasible trace reconstruction for rewriting approximations. In: Pfenning, F. (ed.) RTA 2006. LNCS, 4098, pp. 123-135. Springer, Heidelberg (2006)
    • Boichut, Y., Genet, T.: Feasible trace reconstruction for rewriting approximations. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 123-135. Springer, Heidelberg (2006)
  • 12
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • Grumberg, O, Huth, M, eds, TACAS 2007, Springer, Heidelberg
    • Doghmi, S., Guttman, J., Thayer, F.: Searching for shapes in cryptographic protocols. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 523-537. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4424 , pp. 523-537
    • Doghmi, S.1    Guttman, J.2    Thayer, F.3
  • 13
    • 84937398672 scopus 로고    scopus 로고
    • Genet, T., Tong, V.: Reachability Analysis of Term Rewriting Systems with Timbuk. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), 2250, pp. 695-706. Springer, Heidelberg (2001)
    • Genet, T., Tong, V.: Reachability Analysis of Term Rewriting Systems with Timbuk. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 695-706. Springer, Heidelberg (2001)
  • 16
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • IEEE, Los Alamitos
    • Song, D.X.: Athena: a new efficient automatic checker for security protocol analysis. In: Proc. 12th IEEE Computer Security Foundations Workshop (CSFW), pp. 192-202. IEEE, Los Alamitos (1999)
    • (1999) Proc. 12th IEEE Computer Security Foundations Workshop (CSFW) , pp. 192-202
    • Song, D.X.1
  • 17
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. Operation Systems Review 28(3), 24-37 (1994)
    • (1994) Operation Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.