메뉴 건너뛰기




Volumn 5663 LNAI, Issue , 2009, Pages 355-370

Computing knowledge in security protocols under convergent equational theories

Author keywords

[No Author keywords available]

Indexed keywords

DECISION PROBLEMS; ELECTRONIC VOTING PROTOCOLS; EQUATIONAL THEORY; INDISTINGUISHABILITY; PROTOTYPE IMPLEMENTATIONS; SECURITY PROTOCOLS; SYMBOLIC ANALYSIS;

EID: 69949148046     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02959-2_27     Document Type: Conference Paper
Times cited : (21)

References (20)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
    • (2006) Theoretical Computer Science , vol.387 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 3
    • 38049162024 scopus 로고    scopus 로고
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, pp. 20-35. Springer, Heidelberg (2007)
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 20-35. Springer, Heidelberg (2007)
  • 4
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 6
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • IEEE Comp. Soc. Press, Los Alamitos
    • Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy (S&P 2008). IEEE Comp. Soc. Press, Los Alamitos (2008)
    • (2008) IEEE Symposium on Security and Privacy (S&P
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 9
    • 70350663117 scopus 로고    scopus 로고
    • YAPA: A generic tool for computing intruder knowledge
    • Treinen, R, ed, Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA, Brasiĺia, Brazil, June-July, Springer, Heidelberg to appear, 2009
    • Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA 2009), Brasiĺia, Brazil, June-July 2009. LNCS. Springer, Heidelberg (to appear, 2009)
    • (2009) LNCS
    • Baudet, M.1    Cortier, V.2    Delaune, S.3
  • 11
    • 69949146153 scopus 로고    scopus 로고
    • Ciobǎcǎ, Ş.: KiSs (2009), http://www.lsv.ens-cachan. fr/̃ciobaca/kiss
    • (2009)
    • Ciobǎcǎ, S.1    KiSs2
  • 12
    • 69949159149 scopus 로고    scopus 로고
    • Ciobǎcǎ, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocol under convergent equational theories. Research Report LSV-09-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2009, 42 p. (2009)
    • Ciobǎcǎ, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocol under convergent equational theories. Research Report LSV-09-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2009, 42 p. (2009)
  • 14
    • 38149055615 scopus 로고    scopus 로고
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), 4790, pp. 196-210. Springer, Heidelberg (2007)
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 196-210. Springer, Heidelberg (2007)
  • 15
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 16
    • 69949112592 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • to appear
    • Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security (to appear, 2008)
    • (2008) Journal of Computer Security
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 17
    • 84855190787 scopus 로고    scopus 로고
    • Intruder deduction for the equational theory of Abelian groups with distributive encryption
    • Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Information and Computation 205(4), 581-623 (2007)
    • (2007) Information and Computation , vol.205 , Issue.4 , pp. 581-623
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 19
    • 84956974327 scopus 로고    scopus 로고
    • Receipt-free electronic voting schemes for large scale elections
    • Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
    • Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1361
    • Okamoto, T.1
  • 20
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions and composed keys is NP-complete
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science 299, 451-475 (2003)
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.