메뉴 건너뛰기




Volumn , Issue , 2008, Pages 448-451

Extending rubin logic for electronic commerce protocols

Author keywords

Electronic commerce protocols; Extending Rubin logic; Protocol analysis; Security properties

Indexed keywords

COMMERCE;

EID: 58049141395     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWASID.2008.4688446     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 6
    • 0034434835 scopus 로고    scopus 로고
    • A fair non repudiation cryptographic protocol and its formal analysis and applications
    • Dec
    • X. X. Li, and J. P. Huai, "A fair non repudiation cryptographic protocol and its formal analysis and applications," Journal of Software, vol. 11, no. 12, pp. 1628-1634, Dec. 2001.
    • (2001) Journal of Software , vol.11 , Issue.12 , pp. 1628-1634
    • Li, X.X.1    Huai, J.P.2
  • 7
    • 1442303271 scopus 로고    scopus 로고
    • A fair non-repudiation protocol and its formal analysis
    • Sep
    • J. Liu, and M.T. Zhou, "A fair non-repudiation protocol and its formal analysis," Acta Electronica Sinica, vol. 31, no.9, pp. 1422-1425, Sep. 2003.
    • (2003) Acta Electronica Sinica , vol.31 , Issue.9 , pp. 1422-1425
    • Liu, J.1    Zhou, M.T.2
  • 8
    • 2342542981 scopus 로고
    • Nonmonotonic cryptographic protocols,
    • Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
    • A.D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
    • (1994)
    • Rubin, A.D.1
  • 9
    • 0031386327 scopus 로고    scopus 로고
    • Extending NCP for protocols using public keys
    • Mar
    • A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
    • (1997) Mobile Networks and Applications , vol.2 , Issue.3 , pp. 227-241
    • Rubin, A.D.1
  • 10
    • 0035467046 scopus 로고    scopus 로고
    • A new approach for the analysis of electronic commerce protocols
    • Sep
    • D. C. Zhou, S. H. Qing, and Z. F. Zhou, "A new approach for the analysis of electronic commerce protocols," Journal of Software, vol. 12, no. 9, pp. 1318-1328, Sep. 2001.
    • (2001) Journal of Software , vol.12 , Issue.9 , pp. 1318-1328
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3
  • 16
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 17
    • 0036045935 scopus 로고    scopus 로고
    • BAN-like logic for cryptographic protocols analysis: A survey
    • Y.Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no.1, pp. 96-99, 2002.
    • (2002) Journal of Tsinghua University (Sci & Tech) , vol.42 , Issue.1 , pp. 96-99
    • Zhang, Y.Q.1    Wu, J.P.2    Li, X.3
  • 18
    • 0034434717 scopus 로고    scopus 로고
    • The model and its defects of BAN family of logic
    • Dec
    • J. Z. Xu, Y. X. Dai, and Y.N. Zuo, "The model and its defects of BAN family of logic," Journal of Software, vol. 11, no. 12, pp. 1660-1665, Dec. 2000.
    • (2000) Journal of Software , vol.11 , Issue.12 , pp. 1660-1665
    • Xu, J.Z.1    Dai, Y.X.2    Zuo, Y.N.3
  • 19
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • R. Kailar, "Accountability in electronic commerce protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, pp. 313-328, 1996.
    • (1996) IEEE Trans. Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 20
    • 0000260312 scopus 로고    scopus 로고
    • Limitations of Kailar Logic
    • Dec
    • D. C. Zhou, S. H. Qing, and Z. F. Zhou, "Limitations of Kailar Logic," Journal of Software, vol. 10, no.12, pp. 1238-1245, Dec.1999.
    • (1999) Journal of Software , vol.10 , Issue.12 , pp. 1238-1245
    • Zhou, D.C.1    Qing, S.H.2    Zhou, Z.F.3
  • 21
    • 33750085329 scopus 로고    scopus 로고
    • Z. M. Song, and S. H. Qing, Appling NCP logic to the analysis of SSL3.0, Information and Communication Security, Berlin: Springer-Verlag, 2001, 155-166.
    • Z. M. Song, and S. H. Qing, "Appling NCP logic to the analysis of SSL3.0," Information and Communication Security, Berlin: Springer-Verlag, 2001, 155-166.
  • 22
    • 58049105533 scopus 로고    scopus 로고
    • Analysis of PKM protocol of LMDS by NCP logic
    • Sep
    • S. X. Shao, J. Chen, and M. Wu, "Analysis of PKM protocol of LMDS by NCP logic, " Journal on Communications, vol. 25, no. 9, pp. 146-152, Sep. 2004.
    • (2004) Journal on Communications , vol.25 , Issue.9 , pp. 146-152
    • Shao, S.X.1    Chen, J.2    Wu, M.3
  • 24
    • 49249090421 scopus 로고    scopus 로고
    • Security analysis of routing protocol for MANET based on extended Rubin logic
    • Sanya, pp
    • Yang Xu, and X. Y. Xie, "Security analysis of routing protocol for MANET based on extended Rubin logic," in Proc. 2008 IEEE Int. Conf. Networking, Sensing and Control, Sanya, pp.1326-1331.
    • Proc. 2008 IEEE Int. Conf. Networking, Sensing and Control , pp. 1326-1331
    • Xu, Y.1    Xie, X.Y.2
  • 25
    • 58049156008 scopus 로고    scopus 로고
    • IT security techniques - Non-repudiation - Part 1: General , ISO/IEC 13888-1: 2004.
    • IT security techniques - Non-repudiation - Part 1: General , ISO/IEC 13888-1: 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.