메뉴 건너뛰기




Volumn 61, Issue , 2002, Pages 154-177

Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER SIMULATION; CRYPTOGRAPHY; DATABASE SYSTEMS; SEMANTICS; SYSTEMS ANALYSIS;

EID: 4944237116     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)00311-1     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 2
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the spi calculus
    • Berlin, Germany: Springer-Verlag
    • Abadi M., Gordon A.D. Reasoning about cryptographic protocols in the spi calculus. CONCUR'97: Concurrency Theory, volume 1243. 1997;59-73 Springer-Verlag, Berlin, Germany
    • (1997) CONCUR'97: Concurrency Theory, Volume 1243 , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • Abadi M., Gordon A.D. A bisimulation method for cryptographic protocols. Nordic Journal of Computing. 5:(4):Winter 1998;267-303
    • (1998) Nordic Journal of Computing , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 0027342054 scopus 로고
    • The concurrency workbench: A semantics based tool for the verification of concurrent processes
    • Cleaveland R., Parrow J., Steffen B. The concurrency workbench: a semantics based tool for the verification of concurrent processes. ACM Transactions on Programming Languages and Systems. 15:(1):January 1993;36-72
    • (1993) ACM Transactions on Programming Languages and Systems , vol.15 , Issue.1 , pp. 36-72
    • Cleaveland, R.1    Parrow, J.2    Steffen, B.3
  • 10
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. J. of Computer Security. 3:(1):1994/1995;5-33
    • (1994) J. of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • Proc. of World Congress on Formal Methods (FM'99), Springer
    • R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of World Congress on Formal Methods (FM'99), Springer, LNCS 1708, pages 794-813, 1999.
    • (1999) LNCS , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 14
    • 0003733777 scopus 로고    scopus 로고
    • Decidability results in automata and process theory
    • F. Moller and G. Birthwistle, editors, Logic for Concurrency: Structure versus Automata Springer
    • Y. Hirshfeld and F. Moller. Decidability results in automata and process theory. In F. Moller and G. Birthwistle, editors, Logic for Concurrency: Structure versus Automata, volume 1043 of LNCS, pages 102-148. Springer, 1996.
    • (1996) LNCS , vol.1043 , pp. 102-148
    • Hirshfeld, Y.1    Moller, F.2
  • 15
    • 0025432462 scopus 로고
    • Ccs expressions, finite state processes and three problems of equivalence
    • Kannellakis P., Smolka S. Ccs expressions, finite state processes and three problems of equivalence. Information and Computation. 86:1990;333-354
    • (1990) Information and Computation , vol.86 , pp. 333-354
    • Kannellakis, P.1    Smolka, S.2
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. of TACAS'96 Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. of TACAS'96, volume 1055 of LNCS, pages 147-166. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 0003307796 scopus 로고
    • Security models
    • J. Marciniak. John Wyley & Sons
    • McLean J. Security models. Marciniak J. Encyclopedia of Software Engineering. 1994;1136-1145 John Wyley & Sons
    • (1994) Encyclopedia of Software Engineering , pp. 1136-1145
    • McLean, J.1
  • 19
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • Mullins J. Nondeterministic admissible interference. Journal of Universal Computer Science. 6:(11):2000;1054-1070
    • (2000) Journal of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 20
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • Oakland, CA, May IEEE Computer Society
    • S. Pinsky. Absorbing covers and intransitive non-interference. In Proceedings of the IEEE Symp. on Research in Security and Privacy, pages 102-113, Oakland, CA, May 1995. IEEE Computer Society.
    • (1995) Proceedings of the IEEE Symp. on Research in Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 21
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange using CSP and FDR
    • IEEE Computer Society Press
    • Roscoe A.W. Modelling and verifying key-exchange using CSP and FDR. 8th Computer Security Foundation Workshop. 1995;IEEE Computer Society Press
    • (1995) 8th Computer Security Foundation Workshop
    • Roscoe, A.W.1
  • 24
    • 19144362752 scopus 로고    scopus 로고
    • Decidability of DPDA equivalence
    • University of Edinburgh to appear in Theoretical Computer Science
    • C. Stirling. Decidability of DPDA equivalence. Technical Report LFCS99-411, University of Edinburgh, 2000. to appear in Theoretical Computer Science.
    • (2000) Technical Report , vol.LFCS99-411
    • Stirling, C.1
  • 25
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • Woo T., Lam S. Authentication for distributed systems. IEEE Computer. 25:(1):January 1992;39-52
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.