메뉴 건너뛰기




Volumn 5511 LNCS, Issue , 2009, Pages 92-106

Analysing PKCS#11 key management APIs with unbounded fresh data

Author keywords

[No Author keywords available]

Indexed keywords

BOUNDED MODEL; ENCRYPTION KEY; KEY MANAGEMENT; SECURITY PROPERTIES; SECURITY PROTOCOLS; SYMMETRIC KEYS;

EID: 70349337015     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03459-6_7     Document Type: Conference Paper
Times cited : (23)

References (10)
  • 1
    • 38149132464 scopus 로고    scopus 로고
    • SAT-based model-checking for security protocols analysis
    • Currently developed under the AVANTSSAR project, http://www.avantssar.eu
    • Armando, A., Compagna, L.: SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7(1), 3-32 (2008), http://www.ai-lab.it/ satmc; Currently developed under the AVANTSSAR project, http://www.avantssar.eu
    • (2008) Int. J. Inf. Sec , vol.7 , Issue.1 , pp. 3-32
    • Armando, A.1    Compagna, L.2
  • 2
    • 35248891063 scopus 로고    scopus 로고
    • Clulow, J.: On the security of PKCS#11. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 411-425. Springer, Heidelberg (2003)
    • Clulow, J.: On the security of PKCS#11. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 411-425. Springer, Heidelberg (2003)
  • 3
    • 35048861214 scopus 로고    scopus 로고
    • Automatic analysis of the security of XORbased key management schemes
    • Grumberg, O, Huth, M, eds, TACAS 2007, Springer, Heidelberg
    • Cortier, V., Keighren, G., Steel, G.: Automatic analysis of the security of XORbased key management schemes. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 538-552. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4424 , pp. 538-552
    • Cortier, V.1    Keighren, G.2    Steel, G.3
  • 5
    • 51749109372 scopus 로고    scopus 로고
    • Delaune, S., Kremer, S., Steel, G.: Formal analysis of PKCS#11. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), Pittsburgh, PA, USA, pp. 331-344. IEEE Computer Society Press, Los Alamitos (2008)
    • Delaune, S., Kremer, S., Steel, G.: Formal analysis of PKCS#11. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), Pittsburgh, PA, USA, pp. 331-344. IEEE Computer Society Press, Los Alamitos (2008)
  • 6
    • 35048864875 scopus 로고    scopus 로고
    • The insecurity problem: Tackling unbounded data
    • Venice, Italy, pp, IEEE Computer Society Press, Los Alamitos
    • Fröschle, S.: The insecurity problem: Tackling unbounded data. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF 2007), Venice, Italy, pp. 370-384. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF , pp. 370-384
    • Fröschle, S.1
  • 7
    • 70349346111 scopus 로고    scopus 로고
    • Krhovják, J.: PKCS #11 based APIs. Talk given at the Analysis of Security APIs Workshop (ASA-1) (July 2007), http://homepages.inf.ed.ac.uk/ gsteel/asa/slides/
    • Krhovják, J.: PKCS #11 based APIs. Talk given at the Analysis of Security APIs Workshop (ASA-1) (July 2007), http://homepages.inf.ed.ac.uk/ gsteel/asa/slides/
  • 8
    • 70349338099 scopus 로고    scopus 로고
    • RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard (June 2004)
    • RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard (June 2004)
  • 9
    • 67650219207 scopus 로고    scopus 로고
    • Analysis of PKCS#11 using AVISPA tools
    • Master's thesis, University of Edinburgh 2007
    • Tsalapati, E.: Analysis of PKCS#11 using AVISPA tools. Master's thesis, University of Edinburgh (2007)
    • Tsalapati, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.