메뉴 건너뛰기




Volumn , Issue , 2009, Pages 251-265

Expressive power of definite clauses for verifying authenticity

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICITY VERIFICATION; COMMUNICATION PROTOCOLS; DEFINITE CLAUSE; EXPRESSIVE POWER; SECURITY PROPERTIES;

EID: 70350537002     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2009.12     Document Type: Conference Paper
Times cited : (1)

References (33)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing Security Protocols with Secrecy Types and Logic Programs
    • January
    • Martín Abadi and Bruno Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, January 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 24344493908 scopus 로고    scopus 로고
    • Martín Abadi and Bruno Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(1-2):3-27, OCT 2005. Special issue SAS'03.
    • Martín Abadi and Bruno Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(1-2):3-27, OCT 2005. Special issue SAS'03.
  • 3
    • 28144458017 scopus 로고    scopus 로고
    • Reconstruction of Attacks against Cryptographic Protocols
    • Aix-en-Provence, France, JUN, IEEE Computer Society
    • Xavier Allamigeon and Bruno Blanchet. Reconstruction of Attacks against Cryptographic Protocols. In 18th IEEE Computer Security Foundations Workshop (CSFW-18), pages 140-154, Aix-en-Provence, France, JUN 2005. IEEE Computer Society.
    • (2005) 18th IEEE Computer Security Foundations Workshop (CSFW-18) , pp. 140-154
    • Allamigeon, X.1    Blanchet, B.2
  • 4
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Martín Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 26444497860 scopus 로고    scopus 로고
    • Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, and Laurent Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281-285, 2005.
    • Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, and Laurent Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281-285, 2005.
  • 6
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
    • (2001) SIGPLAN Not , vol.36 , Issue.3 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 10
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Cape Breton, Nova Scotia, Canada, JUN, IEEE Computer Society
    • Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, JUN 2001. IEEE Computer Society.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 11
    • 84958749546 scopus 로고    scopus 로고
    • From Secrecy to Authenticity in Security Protocols
    • Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium SAS'02, of, Madrid, Spain, SEP, Springer Verlag
    • Bruno Blanchet. From Secrecy to Authenticity in Security Protocols. In Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes on Computer Science, pages 342-359, Madrid, Spain, SEP 2002. Springer Verlag.
    • (2002) Lecture Notes on Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 12
    • 33751055370 scopus 로고    scopus 로고
    • Automatic Proof of Strong Secrecy for Security Protocols
    • Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July
    • Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July 2004.
    • (2004)
    • Blanchet, B.1
  • 14
    • 84865526741 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • abs/0802.3444
    • Bruno Blanchet. Automatic verification of correspondences for security protocols. CoRR, abs/0802.3444, 2008.
    • (2008) CoRR
    • Blanchet, B.1
  • 15
    • 70350537298 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • To appear
    • Bruno Blanchet. Automatic verification of correspondences for security protocols. Journal of Computer Security, 2008. To appear.
    • (2008) Journal of Computer Security
    • Blanchet, B.1
  • 16
    • 35248837934 scopus 로고    scopus 로고
    • Hermes: An automatic tool for verification of secrecy in security protocols
    • Liana Bozga, Yassine Lakhnech, and Michaël Périn. Hermes: An automatic tool for verification of secrecy in security protocols. In C AV, pages 219-222, 2003.
    • (2003) C AV , pp. 219-222
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 17
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Andrew Gordon, editor, Foundations of Software Science and Computation Structures FoSSaCS'03, of, Warsaw, Poland, April, Springer Verlag
    • Bruno Blanchet and Andreas Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of Lecture Notes on Computer Science, pages 136-152, Warsaw, Poland, April 2003. Springer Verlag.
    • (2003) Lecture Notes on Computer Science , vol.2620 , pp. 136-152
    • Blanchet, B.1    Podelski, A.2
  • 18
    • 48949088211 scopus 로고    scopus 로고
    • C.J.F. Cremers. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., 5123/2008 of Lecture Notes in Computer Science, pages 414-418. Springer, 2008.
    • C.J.F. Cremers. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., volume 5123/2008 of Lecture Notes in Computer Science, pages 414-418. Springer, 2008.
  • 19
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur., 12(2):247-311, 2004.
    • (2004) J. Comput. Secur , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.1    Lincoln, P.2    Mitchell, J.3    Scedrov, A.4
  • 21
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the nrl protocol analyzer and its meta-logical properties
    • Santiago Escobar, Catherine Meadows, and José Meseguer. A rewriting-based inference system for the nrl protocol analyzer and its meta-logical properties. Theor. Comput. Sci., 367(1):162-202, 2006.
    • (2006) Theor. Comput. Sci , vol.367 , Issue.1 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 22
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • 12(3,4):435-483
    • Andrew D. Gordon and Alan Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Comput. Secur., 12(3,4):435-483, 2004.
    • (2004) J. Comput. Secur
    • Gordon, A.D.1    Jeffrey, A.2
  • 23
    • 20144373910 scopus 로고    scopus 로고
    • Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically
    • Jean Goubault-Larrecq, Muriel Roger, and Kumar Neeraj Verma. Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically. Journal of Logic and Algebraic Programming, 64(2):219-251, 2005.
    • (2005) Journal of Logic and Algebraic Programming , vol.64 , Issue.2 , pp. 219-251
    • Goubault-Larrecq, J.1    Roger, M.2    Neeraj Verma, K.3
  • 26
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 29
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. J. Comput. Secur., 6(1-2):85-128, 1998.
    • (1998) J. Comput. Secur , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 30
    • 0034315111 scopus 로고    scopus 로고
    • Key exchange in ipsec: Analysis of ike
    • Radia Perlman and Charlie Kaufman. Key exchange in ipsec: Analysis of ike. IEEE Internet Computing, 4(6):50-56, 2000.
    • (2000) IEEE Internet Computing , vol.4 , Issue.6 , pp. 50-56
    • Perlman, R.1    Kaufman, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.