메뉴 건너뛰기




Volumn 5458 LNCS, Issue , 2009, Pages 21-32

Validating integrity for the ephemerizer's protocol with CL-Atse

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS TOOLS; STANDARD INTEGRITY; SYMBOLIC ANALYSIS;

EID: 67650272776     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02002-5_2     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 1
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • Amadio, R., Lugiez, D., Vanackére, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
    • (2003) Theor. Comput. Sci , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.1    Lugiez, D.2    Vanackére, V.3
  • 2
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Team. The Avispa Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Team. The Avispa Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 3
    • 14044277509 scopus 로고    scopus 로고
    • Armando, A., Compagna, L.: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004). ENTCS, 125(1), pp. 91-108 (2005)
    • Armando, A., Compagna, L.: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004). ENTCS, vol. 125(1), pp. 91-108 (2005)
  • 5
    • 0030078047 scopus 로고    scopus 로고
    • Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures
    • Baader, F., Schulz, K.U.: Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures. Journal of Symbolic Computing 21(2), 211-243 (1996)
    • (1996) Journal of Symbolic Computing , vol.21 , Issue.2 , pp. 211-243
    • Baader, F.1    Schulz, K.U.2
  • 7
    • 33749413630 scopus 로고    scopus 로고
    • Automatic Verification of Security Protocols Using Approximations
    • RR-5727 October
    • Boichut, Y., Héam, P.-C., Kouchnarenko, O.: Automatic Verification of Security Protocols Using Approximations. INRIA Research Report RR-5727 (October 2005), http://www.inria.fr/rrrt/rr-5727.html
    • (2005) INRIA Research Report
    • Boichut, Y.1    Héam, P.-C.2    Kouchnarenko, O.3
  • 9
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Orejas, F, Spirakis, P.G, van Leeuwen, J, eds, ICALP 2001, Springer, Heidelberg
    • Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 667-681. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 11
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
    • Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 124-135. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 13
    • 67650225702 scopus 로고    scopus 로고
    • Clark, J, Jacob, J, A Survey of Authentication Protocol Literature: Version 1.0, November 17 1997
    • Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0, November 17 (1997), www.cs.york.ac.uk/̃jac/papers/drareview. ps.gz
  • 14
    • 84958742278 scopus 로고    scopus 로고
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 326- 341. Springer, Heidelberg (2002)
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326- 341. Springer, Heidelberg (2002)
  • 18
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press, Los Alamitos
    • Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of DISCEX 2000, pp. 237-250. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) Proceedings of DISCEX , pp. 237-250
    • Meadows, C.1
  • 20
    • 67650216356 scopus 로고    scopus 로고
    • The Ephemerizer: Making Data Disappear. Technical report, Sun Labs
    • Perlman, R.: The Ephemerizer: Making Data Disappear. Technical report, Sun Labs (2005), http://www.research.sun.com/techrep/2005/smll-tr02005-140.pdf
    • Perlman, R.1
  • 22
    • 33749413267 scopus 로고    scopus 로고
    • Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, 4098, pp. 277-286. Springer, Heidelberg (2006)
    • Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277-286. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.