메뉴 건너뛰기




Volumn , Issue , 2007, Pages 239-247

Perfect cryptography, S5 knowledge, and algorithmic knowledge

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; MODEL EXTRACTION;

EID: 70350645240     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1324249.1324281     Document Type: Conference Paper
Times cited : (3)

References (24)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols: The Spi Calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999. (Pubitemid 129608821)
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 28144460109 scopus 로고    scopus 로고
    • Computational and information-theoretic soundness and completeness of formal encryption
    • IEEE Computer Society Press
    • P. Adão, G. Bana, and A. Scedrov. Computational and information-theoretic soundness and completeness of formal encryption. In Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), pages 170-184. IEEE Computer Society Press, 2005.
    • (2005) Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05) , pp. 170-184
    • Adão, P.1    Bana, G.2    Scedrov, A.3
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01) , pp. 82-96
    • Blanchet, B.1
  • 13
    • 35248868917 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for reasoning about security protocols
    • Proc. Workshop on Formal Aspects of Security (FASec'02)
    • J. Y. Halpern and R. Pucella. Modeling adversaries in a logic for reasoning about security protocols. In Proc. Workshop on Formal Aspects of Security (FASec'02), volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2629 , pp. 115-132
    • Halpern, J.Y.1    Pucella, R.2
  • 16
    • 31844443143 scopus 로고    scopus 로고
    • Possibilistic information flow control in the presence of encrypted communication
    • Proc. 9th European Symposium on Research in Computer Security (ESORICS'04), Springer-Verlag
    • D. Hutter and A. Schairer. Possibilistic information flow control in the presence of encrypted communication. In Proc. 9th European Symposium on Research in Computer Security (ESORICS'04), volume 3193 of Lecture Notes in Computer Science, pages 209-224. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 209-224
    • Hutter, D.1    Schairer, A.2
  • 18
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1/2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 21
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • S. Schneider. Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741-758, 1998. (Pubitemid 128741979)
    • (1998) IEEE Transactions on Software Engineering , vol.24 , Issue.9 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.