메뉴 건너뛰기




Volumn 5674 LNCS, Issue , 2009, Pages 1-22

Let's get physical: Models and methods for real-world security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CAPABILITIES; DEVICE PAIRING; DISTANCE BOUNDING; DOLEV-YAO MODEL; EXCLUSIVE-OR; FORMAL MODEL; ISABELLE/HOL; KEY ESTABLISHMENTS; NETWORK TOPOLOGY; NEW APPLICATIONS; PHYSICAL WORLD; REAL-WORLD; SECURE LOCALIZATION; SECURITY PROTOCOLS; TRANSMISSION DELAYS;

EID: 70350340297     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03359-9_1     Document Type: Conference Paper
Times cited : (16)

References (24)
  • 1
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 7
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 8
    • 70350268653 scopus 로고    scopus 로고
    • Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, 2283. Springer, Heidelberg (2002)
    • Nipkow, T., Paulson, L., Wenzel, M.: Isabelle/HOL. LNCS, vol. 2283. Springer, Heidelberg (2002)
  • 11
    • 33749582048 scopus 로고    scopus 로고
    • Ballarin, C.: Interpretation of locales in Isabelle: Theories and proof contexts. In: Borwein, J.M., Farmer, W.M. (eds.) MKM 2006. LNCS (LNAI), 4108, pp. 31-43. Springer, Heidelberg (2006)
    • Ballarin, C.: Interpretation of locales in Isabelle: Theories and proof contexts. In: Borwein, J.M., Farmer, W.M. (eds.) MKM 2006. LNCS (LNAI), vol. 4108, pp. 31-43. Springer, Heidelberg (2006)
  • 13
    • 84876367662 scopus 로고    scopus 로고
    • Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 83-97. Springer, Heidelberg (2006)
    • Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83-97. Springer, Heidelberg (2006)
  • 15
    • 35048864876 scopus 로고    scopus 로고
    • Automatic Verification of Time Sensitive Cryptographic Protocols
    • Jensen, K, Podelski, A, eds, TACAS 2004, Springer, Heidelberg
    • Delzanno, G., Ganty, P.: Automatic Verification of Time Sensitive Cryptographic Protocols. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 342-356. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2988 , pp. 342-356
    • Delzanno, G.1    Ganty, P.2
  • 16
    • 84944070422 scopus 로고    scopus 로고
    • Analysing Time Dependent Security Properties in CSP Using PVS
    • Cuppens, F, Deswarte, Y, Gollmann, D, Waidner, M, eds, ESORICS 2000, Springer, Heidelberg
    • Evans, N., Schneider, S.: Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222-237. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 17
    • 85008543309 scopus 로고    scopus 로고
    • Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
    • Acs, G., Buttyan, L., Vajda, I.: Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(11), 1533-1546 (2006)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Acs, G.1    Buttyan, L.2    Vajda, I.3
  • 20
    • 33750145458 scopus 로고    scopus 로고
    • Defining functions on equivalence classes
    • Paulson, L.: Defining functions on equivalence classes. ACM Transactions on Computational Logic 7(4), 658-675 (2006)
    • (2006) ACM Transactions on Computational Logic , vol.7 , Issue.4 , pp. 658-675
    • Paulson, L.1
  • 21
    • 70350288062 scopus 로고    scopus 로고
    • Basin, D., Constable, R.: Metalogical frameworks. In: Huet, G., Plotkin, G. (eds.) Logical Environments, pp. 1-29. Cambridge University Press, Cambridge (1993); Also available as Technical Report MPI-I-92-205
    • Basin, D., Constable, R.: Metalogical frameworks. In: Huet, G., Plotkin, G. (eds.) Logical Environments, pp. 1-29. Cambridge University Press, Cambridge (1993); Also available as Technical Report MPI-I-92-205
  • 22
    • 3142684246 scopus 로고    scopus 로고
    • Logical frameworks
    • Gabbay, D, Guenthner, F, eds, 2nd edn, Kluwer Academic Publishers, Dordrecht
    • Basin, D., Matthews, S.: Logical frameworks. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd edn., vol. 9, pp. 89-164. Kluwer Academic Publishers, Dordrecht (2002)
    • (2002) Handbook of Philosophical Logic , vol.9 , pp. 89-164
    • Basin, D.1    Matthews, S.2
  • 23
    • 0034634021 scopus 로고    scopus 로고
    • Structuring metatheory on inductive definitions
    • October/November
    • Basin, D., Matthews, S.: Structuring metatheory on inductive definitions. Information and Computation 162(1-2) (October/November 2000)
    • (2000) Information and Computation , vol.162 , Issue.1-2
    • Basin, D.1    Matthews, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.