메뉴 건너뛰기




Volumn 5330 LNAI, Issue , 2008, Pages 128-142

From one session to many: Dynamic tags for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTABILITY AND DECIDABILITY;

EID: 58049112239     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89439-1_9     Document Type: Conference Paper
Times cited : (17)

References (25)
  • 1
    • 58049097680 scopus 로고    scopus 로고
    • From one session to many: Dynamic tags for security protocols
    • LSV-08-20, ENS Cachan, France, 30 pages June
    • Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-20, ENS Cachan, France, 30 pages (June 2008)
    • (2008) Research Report
    • Arapinis, M.1    Delaune, S.2    Kremer, S.3
  • 2
    • 38349010575 scopus 로고    scopus 로고
    • Bounding messages for free in security protocols
    • Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
    • Arapinis, M., Duflot, M.: Bounding messages for free in security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 376-387. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4855 , pp. 376-387
    • Arapinis, M.1    Duflot, M.2
  • 3
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., et al.: The Avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., et al.: The Avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 4
    • 58049089829 scopus 로고    scopus 로고
    • How to guarantee secrecy for cryptographic protocols
    • Beauquier, D., Gauche, F.: How to guarantee secrecy for cryptographic protocols. CoRR, abs/cs/0703140 (2007)
    • (2007) CoRR, abs/cs/0703140
    • Beauquier, D.1    Gauche, F.2
  • 5
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
    • ACM Press, New York
    • Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: Proc. 30th Annual ACM Symposium on the Theory of Computing (STOC 1998), pp. 419-428. ACM Press, New York (1998)
    • (1998) Proc. 30th Annual ACM Symposium on the Theory of Computing (STOC , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Gordon, A.D, ed, FOSSACS 2003, Springer, Heidelberg
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 9
  • 10
    • 38349000750 scopus 로고    scopus 로고
    • Safely composing security protocols
    • Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
    • Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352-363. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4855 , pp. 352-363
    • Cortier, V.1    Delaitre, J.2    Delaune, S.3
  • 11
    • 58049097565 scopus 로고    scopus 로고
    • Safely composing security protocols
    • LSV-08-06, ENS Cachan, France, 39 pages March
    • Cortier, V., Delaune, S.: Safely composing security protocols. Research Report LSV-08-06, ENS Cachan, France, 39 pages (March 2008)
    • (2008) Research Report
    • Cortier, V.1    Delaune, S.2
  • 12
    • 38048999097 scopus 로고    scopus 로고
    • Synthesizing secure protocols
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Cortier, V., Warinschi, B., Zǎlinescu, E.: Synthesizing secure protocols. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 406-421. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 406-421
    • Cortier, V.1    Warinschi, B.2    Zǎlinescu, E.3
  • 13
    • 33845189681 scopus 로고    scopus 로고
    • Cortier, V., Zǎlinescu, E.: Deciding key cycles for security protocols. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS, 4246, pp. 317-331. Springer, Heidelberg (2006)
    • Cortier, V., Zǎlinescu, E.: Deciding key cycles for security protocols. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS, vol. 4246, pp. 317-331. Springer, Heidelberg (2006)
  • 19
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Lowe, G.1
  • 23
    • 35248886574 scopus 로고    scopus 로고
    • Tagging makes secrecy decidable for unbounded nonces as well
    • Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
    • Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable for unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 363-374. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2914 , pp. 363-374
    • Ramanujam, R.1    Suresh, S.P.2
  • 24
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • Ramanujam, R., Suresh, S.P.: Decidability of context-explicit security protocols. Journal of Computer Security 13(1), 135-165 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-165
    • Ramanujam, R.1    Suresh, S.P.2
  • 25
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions and composed keys is NP-complete
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science 299(1-3), 451-475 (2003)
    • (2003) Theoretical Computer Science , vol.299 , Issue.1-3 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.