메뉴 건너뛰기




Volumn 5643 LNCS, Issue , 2009, Pages 35-49

Models and proofs of protocol security: A progress report

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC ANALYSIS; COMPUTATIONAL MODEL; PROGRESS REPORT; PROTOCOL SECURITY; SECURITY PROTOCOLS;

EID: 70350241650     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02658-4_5     Document Type: Conference Paper
Times cited : (85)

References (47)
  • 1
    • 38049061143 scopus 로고    scopus 로고
    • Security protocols: Principles and calculi
    • Aldini, A, Gorrieri, R, eds, FOSAD 2007, Springer, Heidelberg
    • Abadi, M.: Security protocols: Principles and calculi. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 1-23. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4677 , pp. 1-23
    • Abadi, M.1
  • 2
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1), 102-146 (2005)
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 24344493908 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58(1-2), 3-27 (2005)
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2
  • 6
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1999);
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 70350230935 scopus 로고    scopus 로고
    • An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149 January 1998
    • An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149 (January 1998)
  • 8
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 9
    • 84958762859 scopus 로고    scopus 로고
    • Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, 1742, pp. 15-27. Springer, Heidelberg (1999)
    • Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, vol. 1742, pp. 15-27. Springer, Heidelberg (1999)
  • 10
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 202-215 (2008)
    • (2008) Proceedings of the 2008 IEEE Symposium on Security and Privacy , pp. 202-215
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 12
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469-491 (2008)
    • (2008) Journal of Cryptology , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 15
    • 33845212195 scopus 로고    scopus 로고
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, pp. 88-106. Springer, Heidelberg (2006)
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 88-106. Springer, Heidelberg (2006)
  • 16
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82-96 (2001)
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 17
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: 2004 IEEE Symposium on Security and Privacy, pp. 86-100 (2004)
    • (2004) 2004 IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 18
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 2006 IEEE Symposium on Security and Privacy, pp. 140-154 (2006)
    • (2006) 2006 IEEE Symposium on Security and Privacy , pp. 140-154
    • Blanchet, B.1
  • 19
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • February-March
    • Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1) (February-March 2008)
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 20
    • 50249162614 scopus 로고    scopus 로고
    • Automated formal analysis of a protocol for secure file sharing on untrusted storage
    • Blanchet, B., Chaudhuri, A.: Automated formal analysis of a protocol for secure file sharing on untrusted storage. In: 2008 IEEE Symposium on Security and Privacy, pp. 417-431 (2008)
    • (2008) 2008 IEEE Symposium on Security and Privacy , pp. 417-431
    • Blanchet, B.1    Chaudhuri, A.2
  • 21
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Gordon, A.D, ed, FOSSACS 2003, Springer, Heidelberg
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 22
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 25
    • 35048863862 scopus 로고    scopus 로고
    • Symbolic bisimulation in the spi calculus
    • Gardner, P, Yoshida, N, eds, CONCUR 2004, Springer, Heidelberg
    • Borgström, J., Briais, S., Nestmann, U.: Symbolic bisimulation in the spi calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 161-176. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3170 , pp. 161-176
    • Borgström, J.1    Briais, S.2    Nestmann, U.3
  • 27
    • 70350243881 scopus 로고
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No, February
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39 (February 1989)
    • (1989) , vol.39
  • 29
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3), 423-482 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 31
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 32
    • 84869652482 scopus 로고    scopus 로고
    • Freier, A.O, Karlton, P, Kocher, P.C, The SSL protocol: Version 3.0 November 1996
    • Freier, A.O., Karlton, P., Kocher, P.C.: The SSL protocol: Version 3.0 (November 1996), http://www.mozilla.org/projects/security/pki/nss/ssl/draft302. txt
  • 36
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
    • Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 39
    • 23144432349 scopus 로고    scopus 로고
    • Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
    • Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
  • 40
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 42
    • 35048899313 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
  • 44
    • 58349099301 scopus 로고    scopus 로고
    • A modular security analysis of the TLS handshake protocol
    • Pieprzyk, J, ed, ASIACRYPT, Springer, Heidelberg
    • Morrissey, P., Smart, N.P., Warinschi, B.: A modular security analysis of the TLS handshake protocol. In: Pieprzyk, J. (ed.) ASIACRYPT. LNCS, vol. 5350, pp. 55-73. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 55-73
    • Morrissey, P.1    Smart, N.P.2    Warinschi, B.3
  • 45
    • 0031143949 scopus 로고    scopus 로고
    • The changing environment for security protocols
    • Needham, R.M.: The changing environment for security protocols. IEEE Network 11(3), 12-15 (1997)
    • (1997) IEEE Network , vol.11 , Issue.3 , pp. 12-15
    • Needham, R.M.1
  • 47
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • Walukiewicz, I, ed, FOSSACS 2004, Springer, Heidelberg
    • Ramanathan, A., Mitchell, J., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol. 2987, pp. 468-483. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2987 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.2    Scedrov, A.3    Teague, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.