메뉴 건너뛰기




Volumn 17, Issue 4, 2009, Pages 363-434

Automatic verification of correspondences for security protocols

Author keywords

Authentication; Automatic verification; Cryptography; Formal methods; Horn clauses; Security protocols

Indexed keywords

ABSTRACT REPRESENTATION; AUTOMATIC VERIFICATION; CRYPTOGRAPHIC PRIMITIVES; HORN CLAUSE; HORN CLAUSES; PI CALCULUS; SECURITY PROTOCOLS;

EID: 68249091950     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2009-0339     Document Type: Article
Times cited : (163)

References (74)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM 52(1) (2005), 102-146.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 24344493908 scopus 로고    scopus 로고
    • M. Abadi and B. Blanchet, Computer-assisted verification of a protocol for certified email, Science of Computer Programming, Special issue SAS'03 58(1/2) (2005), 3-27.
    • M. Abadi and B. Blanchet, Computer-assisted verification of a protocol for certified email, Science of Computer Programming, Special issue SAS'03 58(1/2) (2005), 3-27.
  • 5
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering 22(1) (1996), 6-15.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 7
    • 84958762859 scopus 로고    scopus 로고
    • The game of the name in cryptographic tables
    • Advances in Computing Science, ASIAN'99, P.S. Thiagarajan and R. Yap, eds, Phuket, Thailand, December, Springer
    • R. Amadio and S. Prasad, The game of the name in cryptographic tables, in: Advances in Computing Science - ASIAN'99, P.S. Thiagarajan and R. Yap, eds, Phuket, Thailand, December 1999, Lecture Notes on Computer Science, Vol. 1742, Springer, 1999, pp. 15-27.
    • (1999) Lecture Notes on Computer Science , vol.1742 , pp. 15-27
    • Amadio, R.1    Prasad, S.2
  • 8
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • Computer Science Today: Recent Trends and Developments, J. van Leeuven, ed, Springer
    • R. Anderson and R. Needham, Programming Satan's computer, in: Computer Science Today: Recent Trends and Developments, J. van Leeuven, ed., Lecture Notes on Computer Science, Vol. 1000, Springer, 1995, pp. 426-440.
    • (1995) Lecture Notes on Computer Science , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 9
    • 68249092518 scopus 로고    scopus 로고
    • L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, 1, Chapter 2, A. Robinson and A. Voronkov, eds, North-Holland, 2001, pp. 19-100.
    • L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, Vol. 1, Chapter 2, A. Robinson and A. Voronkov, eds, North-Holland, 2001, pp. 19-100.
  • 11
    • 84945119254 scopus 로고    scopus 로고
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO 1993, Santa Barbara, CA, August 1993, D.R. Stinson, ed., Lecture Notes on Computer Science, 773, Springer, 1993, pp. 232-249.
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO 1993, Santa Barbara, CA, August 1993, D.R. Stinson, ed., Lecture Notes on Computer Science, Vol. 773, Springer, 1993, pp. 232-249.
  • 12
    • 35048821943 scopus 로고    scopus 로고
    • K. Bhargavan, C. Fournet, A.D. Gordon and R. Pucella, TulaFale: A security tool for web services, in: Formal Methods for Components and Objects (FMCO 2003), Leiden, The Netherlands, November 2003, Lecture Notes on Computer Science, 3188, Springer, 2003, pp. 197-222. Paper and tool available at http://securing.ws/.
    • K. Bhargavan, C. Fournet, A.D. Gordon and R. Pucella, TulaFale: A security tool for web services, in: Formal Methods for Components and Objects (FMCO 2003), Leiden, The Netherlands, November 2003, Lecture Notes on Computer Science, Vol. 3188, Springer, 2003, pp. 197-222. Paper and tool available at http://securing.ws/.
  • 13
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • NS, Canada, June, IEEE Computer Society
    • B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, NS, Canada, June 2001, IEEE Computer Society, 2001, pp. 82-96.
    • (2001) in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton , pp. 82-96
    • Blanchet, B.1
  • 14
    • 84958749546 scopus 로고    scopus 로고
    • B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, September 2002, M. Hermenegildo and G. Puebla, eds, Lecture Notes on Computer Science, 2477, Springer, 2002, pp. 342-359.
    • B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, September 2002, M. Hermenegildo and G. Puebla, eds, Lecture Notes on Computer Science, Vol. 2477, Springer, 2002, pp. 342-359.
  • 15
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • Oakland, CA, May
    • B. Blanchet, Automatic proof of strong secrecy for security protocols, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 2004, pp. 86-100.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 16
    • 33751055370 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July
    • B. Blanchet, Automatic proof of strong secrecy for security protocols, Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July 2004.
    • (2004)
    • Blanchet, B.1
  • 17
    • 22344454117 scopus 로고    scopus 로고
    • Security protocols: From linear to classical logic by abstract interpretation
    • B. Blanchet, Security protocols: From linear to classical logic by abstract interpretation, Information Processing Letters 95(5) (2005), 473-479.
    • (2005) Information Processing Letters , vol.95 , Issue.5 , pp. 473-479
    • Blanchet, B.1
  • 18
    • 50249174290 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • 0802.3444v1, 2008; available at
    • B. Blanchet, Automatic verification of correspondences for security protocols, Report arXiv:0802.3444v1, 2008; available at: http://arxiv.org/abs/ 0802.3444v1.
    • Report arXiv
    • Blanchet, B.1
  • 20
    • 50249162614 scopus 로고    scopus 로고
    • Automated formal analysis of a protocol for secure file sharing on untrusted storage
    • Oakland, CA, May, IEEE
    • B. Blanchet and A. Chaudhuri, Automated formal analysis of a protocol for secure file sharing on untrusted storage, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 2008, IEEE, 2008, pp. 417-431.
    • (2008) IEEE Symposium on Security and Privacy , pp. 417-431
    • Blanchet, B.1    Chaudhuri, A.2
  • 21
    • 13644264990 scopus 로고    scopus 로고
    • B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Theoretical Computer Science, Special issue FoSSaCS'03 333(1/2) (2005), 67-90.
    • B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Theoretical Computer Science, Special issue FoSSaCS'03 333(1/2) (2005), 67-90.
  • 23
    • 84944038631 scopus 로고    scopus 로고
    • Automating data independence
    • 6th European Symposium on Research in Computer Security ESORICS 2000, Toulouse, France, October, Springer
    • P. Broadfoot, G. Lowe and B. Roscoe, Automating data independence, in: 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France, October 2000, Lecture Notes on Computer Science, Vol. 1895, Springer, 2000, pp. 175-190.
    • (2000) Lecture Notes on Computer Science , vol.1895 , pp. 175-190
    • Broadfoot, P.1    Lowe, G.2    Roscoe, B.3
  • 24
    • 3042610243 scopus 로고    scopus 로고
    • Embedding agents within the intruder to detect parallel attacks
    • P.J. Broadfoot and A.W. Roscoe, Embedding agents within the intruder to detect parallel attacks, Journal of Computer Security 12(3/4) (2004), 379-408.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 379-408
    • Broadfoot, P.J.1    Roscoe, A.W.2
  • 25
    • 28144464907 scopus 로고    scopus 로고
    • M. Bugliesi, R. Focardi and M. Maffei, Analysis of typed analyses of authentication protocols, in: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), Aix-en-Provence, France, June 2005, IEEE Computer Society Press, 2005, pp. 112-125.
    • M. Bugliesi, R. Focardi and M. Maffei, Analysis of typed analyses of authentication protocols, in: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), Aix-en-Provence, France, June 2005, IEEE Computer Society Press, 2005, pp. 112-125.
  • 27
    • 0000523051 scopus 로고
    • A logic of authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center Report, February
    • M. Burrows, M. Abadi and R. Needham, A logic of authentication, Proceedings of the Royal Society of London A 426 (1989), 233-271. (A preliminary version appeared as Digital Equipment Corporation Systems Research Center Report No. 39, February 1989.)
    • (1989) Proceedings of the Royal Society of London A , vol.426 , Issue.39 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 28
    • 35248865266 scopus 로고    scopus 로고
    • Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 2003, P.K. Pandya and J. Radhakrishnan, eds, Lecture Notes on Computer Science, 2914, Springer, 2003, pp. 124-135.
    • Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 2003, P.K. Pandya and J. Radhakrishnan, eds, Lecture Notes on Computer Science, Vol. 2914, Springer, 2003, pp. 124-135.
  • 30
    • 68249109831 scopus 로고    scopus 로고
    • J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, Department of Computer Science, University of York, November 1997
    • J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, Department of Computer Science, University of York, November 1997.
  • 31
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • E. Cohen, First-order verification of cryptographic protocols, Journal of Computer Security 11(2) (2003), 189-216.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 32
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • Ottawa, ON, Canada, June, IEEE Computer Society
    • H. Comon-Lundh and V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Symposium on Logic in Computer Science (LICS'03), Ottawa, ON, Canada, June 2003, IEEE Computer Society, 2003, pp. 271-280.
    • (2003) Symposium on Logic in Computer Science (LICS'03) , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 35
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system and compositional logic for security protocols, Journal of Computer Security 13(3) (2005), 423-482.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 37
    • 0003332235 scopus 로고    scopus 로고
    • A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
    • Rutgers University, New Jersey, September
    • M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi, A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, September 1997.
    • (1997) DIMACS Workshop on Design and Formal Verification of Security Protocols
    • Debbabi, M.1    Mejri, M.2    Tawbi, N.3    Yahmadi, I.4
  • 38
    • 84976665942 scopus 로고    scopus 로고
    • D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Commun. ACM 24(8) (1981), 533-536.
    • D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Commun. ACM 24(8) (1981), 533-536.
  • 41
    • 35048902864 scopus 로고    scopus 로고
    • A. Durante, R. Focardi and R. Gorrieri, CVS at work: A report on new failures upon some cryptographic protocols, in: Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'01), St. Petersburg, Russia, May 2001, V. Gorodetski, V. Skormin and L. Popyack, eds, Lecture Notes on Computer Science, 2052, Springer, 2001, pp. 287-299.
    • A. Durante, R. Focardi and R. Gorrieri, CVS at work: A report on new failures upon some cryptographic protocols, in: Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'01), St. Petersburg, Russia, May 2001, V. Gorodetski, V. Skormin and L. Popyack, eds, Lecture Notes on Computer Science, Vol. 2052, Springer, 2001, pp. 287-299.
  • 42
  • 43
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
    • S. Escobar, C. Meadows and J. Meseguer, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Theoretical Computer Science 367(1/2) (2006), 162-202.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 46
    • 68249115226 scopus 로고    scopus 로고
    • personal communication
    • A. Gordon, personal communication.
    • Gordon, A.1
  • 47
    • 35248815623 scopus 로고    scopus 로고
    • Typing one-to-one and one-to-many correspondences in security protocols, in: Software Security - Theories and Systems
    • Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 2002, M. Okada, B. Pierce, A. Scedriv, H. Tokuda and A. Yonezawa, eds, Springer
    • A. Gordon and A. Jeffrey, Typing one-to-one and one-to-many correspondences in security protocols, in: Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 2002, M. Okada, B. Pierce, A. Scedriv, H. Tokuda and A. Yonezawa, eds, Lecture Notes on Computer Science, Vol. 2609, Springer, 2002, pp. 263-282.
    • (2002) Lecture Notes on Computer Science , vol.2609 , pp. 263-282
    • Gordon, A.1    Jeffrey, A.2
  • 48
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. Gordon and A. Jeffrey, Authenticity by typing for security protocols, Journal of Computer Security 11(4) (2003), 451-521.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.1    Jeffrey, A.2
  • 49
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Journal of Computer Security 12(3/4) (2004), 435-484.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.1    Jeffrey, A.2
  • 50
    • 20144373910 scopus 로고    scopus 로고
    • Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically
    • J. Goubault-Larrecq, M. Roger and K.N. Verma, Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically, Journal of Logic and Algebraic Programming 64(2) (2005), 219-251.
    • (2005) Journal of Logic and Algebraic Programming , vol.64 , Issue.2 , pp. 219-251
    • Goubault-Larrecq, J.1    Roger, M.2    Verma, K.N.3
  • 51
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J.D. Guttman and F.J.T. Fábrega, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Fábrega, F.J.T.2
  • 53
    • 14844344837 scopus 로고    scopus 로고
    • A decision procedure for the existence of a rank function
    • J. Heather and S. Schneider, A decision procedure for the existence of a rank function, Journal of Computer Security 13(2) (2005), 317-344.
    • (2005) Journal of Computer Security , vol.13 , Issue.2 , pp. 317-344
    • Heather, J.1    Schneider, S.2
  • 55
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, Springer
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes on Computer Science, Vol. 1055, Springer, 1996, pp. 147-166.
    • (1996) Lecture Notes on Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 56
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • Rockport, MA, June, IEEE Computer Society
    • G. Lowe, A hierarchy of authentication specifications, in: 10th Computer Security Foundations Workshop (CSFW '97), Rockport, MA, June 1997, IEEE Computer Society, 1997, pp. 31-43.
    • (1997) 10th Computer Security Foundations Workshop (CSFW '97) , pp. 31-43
    • Lowe, G.1
  • 57
    • 0030640054 scopus 로고    scopus 로고
    • Oriented equational logic programming is complete
    • C. Lynch, Oriented equational logic programming is complete, Journal of Symbolic Computation 21(1) (1997), 23-45.
    • (1997) Journal of Symbolic Computation , vol.21 , Issue.1 , pp. 23-45
    • Lynch, C.1
  • 58
    • 0030084918 scopus 로고    scopus 로고
    • An overview
    • The NRL protocol analyzer
    • C.A. Meadows, The NRL protocol analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.A.1
  • 60
    • 24144477933 scopus 로고    scopus 로고
    • Symbolic protocol analysis with an abelian group operator or DiffieHellman exponentiation
    • J. Millen and V. Shmatikov, Symbolic protocol analysis with an abelian group operator or DiffieHellman exponentiation, Journal of Computer Security 13(3) (2005), 515-564.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 515-564
    • Millen, J.1    Shmatikov, V.2
  • 62
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Commun. ACM 21(12) (1978), 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 64
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees, Efficient and timely mutual authentication, Operating Systems Review 21(1) (1987), 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 65
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6(1/2) (1998), 85-128.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 66
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A.W. Roscoe and P.J. Broadfoot, Proving security protocols with model checkers by data independence techniques, Journal of Computer Security 7(2/3) (1999), 147-190.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 67
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • M. Rusinowitch and M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, Theoretical Computer Science 299(1-3) (2003), 451-475.
    • (2003) Theoretical Computer Science , vol.299 , Issue.1-3 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 68
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D.X. Song, S. Berezin and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1/2) (2001), 47-74.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3
  • 70
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • P. Syverson and C. Meadows, A formal language for cryptographic protocol requirements, Designs, Codes, and Cryptography 7(1/2) (1996), 27-59.
    • (1996) Designs, Codes, and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2
  • 71
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • in: 16th International Conference on Automated Deduction CADE-16, Trento, Italy, July, H. Ganzinger, ed, Springer
    • C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: 16th International Conference on Automated Deduction (CADE-16), Trento, Italy, July 1999, H. Ganzinger, ed., Lecture Notes in Artificial Intelligence, Vol. 1632, Springer, 1999, pp. 314-328.
    • (1999) Lecture Notes in Artificial Intelligence , vol.1632 , pp. 314-328
    • Weidenbach, C.1
  • 72
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, Computer 25(1) (1992), 39-52.
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 74
    • 13644258471 scopus 로고    scopus 로고
    • Authentication for distributed systems
    • October, D. Denning and P. Denning, eds, ACM Press and Addison-Wesley
    • T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, in: Internet Besieged: Countering Cyberspace Scofflaws, October 1997, D. Denning and P. Denning, eds, ACM Press and Addison-Wesley, 1997, pp. 319-355.
    • (1997) Internet Besieged: Countering Cyberspace Scofflaws , pp. 319-355
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.