메뉴 건너뛰기




Volumn 17, Issue , 2004, Pages 30-45

Abstraction and refinement in protocol derivation

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTION; INTERNET KEY EXCHANGE; PROTOCOL DERIVATION;

EID: 4944226639     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (34)
  • 4
    • 4944223564 scopus 로고    scopus 로고
    • On specification carrying software, its refinement and composition
    • H. Ehrig, B.J. Kramer, and A. Ertas, editors, Society for Design and Process Science
    • M. Anlauff and D. Pavlovic. On specification carrying software, its refinement and composition. In H. Ehrig, B.J. Kramer, and A. Ertas, editors, Proceedings of IDPT 2002. Society for Design and Process Science, 2002.
    • (2002) Proceedings of IDPT 2002
    • Anlauff, M.1    Pavlovic, D.2
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symp. on the Foundations of Computer Science. IEEE, 2001. Full version available at http://eprint.iacr.org/2000/067/ .
    • (2001) Proc. 42nd IEEE Symp. on the Foundations of Computer Science
    • Canetti, R.1
  • 13
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(4):677-721, 2004.
    • (2004) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 14
    • 0000218554 scopus 로고
    • The undecidability of the second-order unification problem
    • W. D. Goldfarb. The undecidability of the second-order unification problem. Theoretical Computer Science, 13:225-230, 1981.
    • (1981) Theoretical Computer Science , vol.13 , pp. 225-230
    • Goldfarb, W.D.1
  • 17
    • 4944267395 scopus 로고    scopus 로고
    • Internet Key Exchange (IKEv2) Protocol
    • C. Kaufman. Internet Key Exchange (IKEv2) Protocol, 2004. Internet Draft.
    • (2004) Internet Draft
    • Kaufman, C.1
  • 18
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. J. Cryptology, 7(2):79-130, 1994.
    • (1994) J. Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 19
    • 35248816546 scopus 로고    scopus 로고
    • Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols
    • Springer-Verlag Heidelberg
    • H. Krawczyk. Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols. In Advances in Cryptology - CRYPTO 2003, volume 2729, pages 400-425. Springer-Verlag Heidelberg, 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 27
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 32
    • 84944075155 scopus 로고    scopus 로고
    • Guarded transitions in evolving specifications
    • H. Kirchner and C. Ringeissen, editors, Springer Verlag
    • D. Pavlovic and D. R. Smith. Guarded transitions in evolving specifications. In H. Kirchner and C. Ringeissen, editors, Proceedings of AMAST 2002, volume 2422 of LNCS, pages 411-425. Springer Verlag, 2002.
    • (2002) Proceedings of AMAST 2002, Volume 2422 of LNCS , vol.2422 , pp. 411-425
    • Pavlovic, D.1    Smith, D.R.2
  • 33
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Washington
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-200, Washington, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.