메뉴 건너뛰기




Volumn 15, Issue 4, 2008, Pages 369-380

Rule-based dependency models for security protocol analysis

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL METHODS;

EID: 50249147298     PISSN: 10692509     EISSN: None     Source Type: Journal    
DOI: 10.3233/ica-2008-15407     Document Type: Conference Paper
Times cited : (9)

References (27)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secret by typing in security protocols
    • M. Abadi, Secret by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory 44(5) (1998), 1897-1905.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 8
    • 33745614656 scopus 로고    scopus 로고
    • Analyzing Security Protocols Using Association Rule Mining
    • Proceeding of Australian Conference on Artificial Intelligence 2005, Springer
    • Q.F. Chen and Y.Y.P. Chen, Analyzing Security Protocols Using Association Rule Mining. Proceeding of Australian Conference on Artificial Intelligence 2005, LNCS 3809, Springer, 2005, 245-253.
    • (2005) LNCS , vol.3809 , pp. 245-253
    • Chen, Q.F.1    Chen, Y.Y.P.2
  • 9
    • 33745670893 scopus 로고    scopus 로고
    • Detecting Collusion Attacks in Security Protocols
    • Proceeding of 8th Asia-Pacific Web Conference, Springer-Verlag
    • Q.F. Chen, Y.P.P. Chen, S.C. Zhang and C.Q. Zhang, Detecting Collusion Attacks in Security Protocols, Proceeding of 8th Asia-Pacific Web Conference, LNCS 3841, Springer-Verlag, 2006, 297-306.
    • (2006) LNCS , vol.3841 , pp. 297-306
    • Chen, Q.F.1    Chen, Y.P.P.2    Zhang, S.C.3    Zhang, C.Q.4
  • 10
    • 20344364418 scopus 로고    scopus 로고
    • A Logical Framework for Verifying Secure Transaction Protocols
    • ENDL
    • Q.F. Chen, C.Q. Zhang and S.C. Zhang, ENDL: A Logical Framework for Verifying Secure Transaction Protocols, Knowledge and Information Systems 7(1) (2006), 84-109.
    • (2006) Knowledge and Information Systems , vol.7 , Issue.1 , pp. 84-109
    • Chen, Q.F.1    Zhang, C.Q.2    Zhang, S.C.3
  • 14
    • 0032623470 scopus 로고    scopus 로고
    • Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification
    • S. Gritzalis, Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification, Computer Communications 22(8) (1999), 695-707.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 695-707
    • Gritzalis, S.1
  • 16
    • 50249165700 scopus 로고    scopus 로고
    • http://b-course.cs.helsinki.fi/obc/.
  • 17
    • 50249116532 scopus 로고    scopus 로고
    • http://www.deakin.edu.au/̃qifengch/ksem/dependence.doc.
  • 20
    • 50249184382 scopus 로고    scopus 로고
    • J. Lin and A.O. Mendelzon, Knowledge base merging by majority, In Dynamic Worlds: From the Frame Problem to Knowledge Management, Kluwer, 1999.
    • J. Lin and A.O. Mendelzon, Knowledge base merging by majority, In Dynamic Worlds: From the Frame Problem to Knowledge Management, Kluwer, 1999.
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 1055, Springer, 1996, 147-166.
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), vol 1055, Springer, 1996, 147-166.
  • 23
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • C. Meadows, Formal methods for cryptographic protocol analysis: emerging issues and trends, IEEE Journal on Selected Areas in Communications 21(1) (2003), 44-54.
    • (2003) IEEE Journal on Selected Areas in Communications , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 26
    • 50249186719 scopus 로고    scopus 로고
    • SET Secure Electronic Transaction Specification, Version 1.0, May 31
    • SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, Version 1.0, May 31, 1997.
    • (1997) Book 3: Formal Protocol Definition
  • 27
    • 0042823817 scopus 로고    scopus 로고
    • Association Rule Mining: Models and Algorithms
    • Springer
    • C.Q. Zhang and S.C. Zhang,Association Rule Mining: Models and Algorithms, LNAI 2307, Springer, 2002.
    • (2002) LNAI , vol.2307
    • Zhang, C.Q.1    Zhang, S.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.