메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Analysis of authentication protocols based on rubin logic

Author keywords

Andrew secure RPCprotocol; Authentication protocols; BAN logic; Rubin logic; Security; X 509 authentication protocol

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; MOBILE COMPUTING; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58049120659     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCom.2008.1120     Document Type: Conference Paper
Times cited : (12)

References (16)
  • 3
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • Apr
    • D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, Apr. 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 4
    • 0036045935 scopus 로고    scopus 로고
    • BAN-like logic for cryptographic protocols analysis: A survey
    • Jan
    • Y. Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no.1, pp. 96-99, Jan. 2002.
    • (2002) Journal of Tsinghua University (Sci & Tech) , vol.42 , Issue.1 , pp. 96-99
    • Zhang, Y.Q.1    Wu, J.P.2    Li, X.3
  • 5
    • 2342542981 scopus 로고
    • Nonmonotonic cryptographic protocols,
    • Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
    • A. D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
    • (1994)
    • Rubin, A.D.1
  • 6
    • 0031386327 scopus 로고    scopus 로고
    • Extending NCP for protocols using public keys
    • Mar
    • A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
    • (1997) Mobile Networks and Applications , vol.2 , Issue.3 , pp. 227-241
    • Rubin, A.D.1
  • 7
    • 33750085329 scopus 로고    scopus 로고
    • Z. M. Song, and S. H. Qing, Appling NCP logic to the analysis of SSL3.0, Information and Communication Security. Berlin: Springer-Verlag, pp. 155-166, 2001.
    • Z. M. Song, and S. H. Qing, "Appling NCP logic to the analysis of SSL3.0," Information and Communication Security. Berlin: Springer-Verlag, pp. 155-166, 2001.
  • 8
    • 58049105533 scopus 로고    scopus 로고
    • Analysis of PKM protocol of LMDS by NCP logic
    • Sep
    • S. X. Shao, J. Chen, and M. Wu, "Analysis of PKM protocol of LMDS by NCP logic, " Journal on Communications, vol. 25, no. 9, pp. 146-152, Sep. 2004.
    • (2004) Journal on Communications , vol.25 , Issue.9 , pp. 146-152
    • Shao, S.X.1    Chen, J.2    Wu, M.3
  • 10
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • Aug
    • M. Satyanarayanan, "Integrating security in a large distributed system," ACM Transactions on Computer Systems, vol. 7, no. 3, pp. 247-280, Aug. 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 12
    • 58049090978 scopus 로고    scopus 로고
    • Recommendation X.509-The directory: public-key and attribute certificate frameworks, ITU-T, 2005.
    • Recommendation X.509-The directory: public-key and attribute certificate frameworks, ITU-T, 2005.
  • 13
    • 16644392725 scopus 로고
    • Security defects in the CCITT recommendation X. 509-The directory authentication framework
    • May
    • C. I'Anson, and C. Mitchell, "Security defects in the CCITT recommendation X. 509-The directory authentication framework," Computer Communication Review, vol. 20, no. 2, pp.30-34, May 1990.
    • (1990) Computer Communication Review , vol.20 , Issue.2 , pp. 30-34
    • I'Anson, C.1    Mitchell, C.2
  • 14
    • 12144253238 scopus 로고    scopus 로고
    • Analysis of CCITT X. 509 Based on Strand Space Model
    • Oct
    • R. Jang, J. H. Li, and L. Pan, "Analysis of CCITT X. 509 Based on Strand Space Model," Journal of Shanghai Jiaotong University, vol.38, no.10, pp. 169-173, Oct. 2004.
    • (2004) Journal of Shanghai Jiaotong University , vol.38 , Issue.10 , pp. 169-173
    • Jang, R.1    Li, J.H.2    Pan, L.3
  • 15
    • 0000874415 scopus 로고
    • Limitations of the Kerberos Authentication. System
    • Oct
    • S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication. System," Computer Communication. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
    • (1990) Computer Communication. Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 16
    • 1442278656 scopus 로고    scopus 로고
    • Twenty Years Development of Security Protocols Research
    • Oct
    • S. H. Qing, "Twenty Years Development of Security Protocols Research," Journal of Software, vol. 14, no. 10, pp. 1740-1752, Oct. 2003.
    • (2003) Journal of Software , vol.14 , Issue.10 , pp. 1740-1752
    • Qing, S.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.