메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 47-61

Symbolic protocol analysis with products and Diffie-Hellman exponentiation

Author keywords

Access protocols; Algebra; Authentication; Computer science; Cryptographic protocols; Cryptography; Data security; Equations; Interleaved codes; Laboratories

Indexed keywords

ALGEBRA; AUTHENTICATION; COMPUTABILITY AND DECIDABILITY; COMPUTER SCIENCE; CRYPTOGRAPHY; LABORATORIES; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 70349714960     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212704     Document Type: Conference Paper
Times cited : (39)

References (25)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Proc. CONCUR '00
    • R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. CONCUR '00, volume 1877 of LNCS, pages 380-394, 2000.
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 2
    • 0346205107 scopus 로고    scopus 로고
    • Unification theory
    • A. Robinson and A. Voronkov, editors, chapter 8, Elsevier Science
    • F. Baader and W. Snyder. Unification theory. In A. Robinson and A. Voronkov, editors, Handbook of Automated Reasoning, volume 1, chapter 8, pages 445-532. Elsevier Science, 2001.
    • (2001) Handbook of Automated Reasoning , vol.1 , pp. 445-532
    • Baader, F.1    Snyder, W.2
  • 3
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP '01, pages 667-681, 2001.
    • (2001) Proc. ICALP '01 , pp. 667-681
    • Boreale, M.1
  • 6
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints, and ping-pong protocols. In Proc. ICALP '01, pages 682-693, 2001.
    • (2001) Proc. ICALP '01 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 7
    • 9444264816 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • to appear
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. LICS '03 (to appear), 2003.
    • (2003) Proc. LICS '03
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 8
    • 0001113391 scopus 로고
    • An efficient algorithm for solving systems of Diophantine equations
    • E. Contejean and H. Devie. An efficient algorithm for solving systems of Diophantine equations. Information and Computation, 113(1):143-172, 1994.
    • (1994) Information and Computation , vol.113 , Issue.1 , pp. 143-172
    • Contejean, E.1    Devie, H.2
  • 13
    • 0041498690 scopus 로고    scopus 로고
    • Analyzing protocols that use modular exponentiation: Semantic unification techniques
    • to appear
    • D. Kapur, P. Narendran, and L. Wang. Analyzing protocols that use modular exponentiation: Semantic unification techniques. In Proc. RTA '03 (to appear), 2003.
    • (2003) Proc. RTA '03
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 14
    • 0017996760 scopus 로고
    • Time, clocks and the ordering of events in a distributed system
    • L. Lamport. Time, clocks and the ordering of events in a distributed system. Comms. ACM, 21(7):558-565, 1978.
    • (1978) Comms. ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1/2):85-128, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.1
  • 21
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 22
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • D. Song. Athena: a new efficient automatic checker for security protocol analysis. In Proc. 12th IEEE Computer Security Foundations Workshop, pages 192-202, 1999.
    • (1999) Proc. 12th IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1
  • 24
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct?
    • F. Thayer, J. Herzog, and J. Guttman. Strand spaces: proving security protocols correct? J. Computer Security, 7(1), 1999.
    • (1999) J. Computer Security , vol.7 , pp. 1
    • Thayer, F.1    Herzog, J.2    Guttman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.