메뉴 건너뛰기




Volumn , Issue , 2001, Pages 1507-1515

Petri nets in cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SEMANTICS;

EID: 66349124909     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2001.925135     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 7
    • 33646165007 scopus 로고
    • Automated security analysis of cryptographic protocols using coloured Petri net specifications
    • E. Doyle, S. E. Tavares, and H. Meijer. Automated security analysis of cryptographic protocols using coloured Petri net specifications. In SAC'95, 1995.
    • (1995) SAC'95
    • Doyle, E.1    Tavares, S.E.2    Meijer, H.3
  • 10
    • 48249136282 scopus 로고
    • Modelling and analyzing cryptographic protocols using Petri nets
    • Advances in Cryptology-AUSCRYPT '92, Springer- Verlag
    • B. B. Nieh and S. E. Tavares. Modelling and analyzing cryptographic protocols using Petri nets. In Advances in Cryptology-AUSCRYPT '92, volume 718 of LNCS, pages 275-295. Springer-Verlag, 1992.
    • (1992) LNCS , vol.718 , pp. 275-295
    • Nieh, B.B.1    Tavares, S.E.2
  • 11
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 13
    • 85029606643 scopus 로고
    • Observable properties of higher order functions that dynamically create local names, or: What's new?
    • Mathematical Foundations of Computer Science, Proc. 18th Int. Symp., Gdañsk, 1993, Springer- Verlag, Berlin
    • A. M. Pitts and I. Stark. Observable properties of higher order functions that dynamically create local names, or: What's new? In Mathematical Foundations of Computer Science, Proc. 18th Int. Symp., Gdañsk, 1993, volume 711 of Lecture Notes in Computer Science, pages 122-141. Springer-Verlag, Berlin, 1993.
    • (1993) Lecture Notes in Computer Science , vol.711 , pp. 122-141
    • Pitts, A.M.1    Stark, I.2
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 85022794780 scopus 로고
    • Event Structures
    • Springer- Verlag
    • G. Winskel. Event Structures, volume 255 of LNCS, pages 325-392. Springer-Verlag, 1986.
    • (1986) LNCS , vol.255 , pp. 325-392
    • Winskel, G.1
  • 18
    • 45949126084 scopus 로고
    • Petri nets, algebras, morphisms, and compositionality
    • G. Winskel. Petri nets, algebras, morphisms, and compositionality. Information and Computation, 72:197-238, 1987.
    • (1987) Information and Computation , vol.72 , pp. 197-238
    • Winskel, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.