메뉴 건너뛰기




Volumn 5595 LNCS, Issue , 2009, Pages 148-163

YAPA: A generic tool for computing intruder knowledge

Author keywords

[No Author keywords available]

Indexed keywords

APPLIED PI CALCULUS; DECISION PROCEDURE; EFFICIENT IMPLEMENTATION; EQUATIONAL LOGIC; EQUATIONAL THEORY; FORMAL ANALYSIS; GENERAL TOOLS; GENERIC PROCEDURES; REWRITE SYSTEMS; SECURITY PROTOCOLS; STATIC EQUIVALENCE;

EID: 70350663117     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02348-4_11     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 1
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • Aceto, L, Ingólfsdóttir, A, eds, FOSSACS 2006, Springer, Heidelberg
    • Abadi, M., Baudet, M., Warinschi, B.: Guessing attacks and the computational soundness of static equivalence. In: Aceto, L., Ingólfsdóttir, A. (eds.) FOSSACS 2006. LNCS, vol. 3921, pp. 398-412. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 2
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
    • (2006) Theoretical Computer Science , vol.387 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 4
    • 38049162024 scopus 로고    scopus 로고
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, pp. 20-35. Springer, Heidelberg (2007)
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 20-35. Springer, Heidelberg (2007)
  • 5
    • 33745778843 scopus 로고    scopus 로고
    • Deciding security of protocols against off-line guessing attacks
    • ACM Press, New York
    • Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 16-25. ACM Press, New York (2005)
    • (2005) 12th ACM Conference on Computer and Communications Security (CCS , pp. 16-25
    • Baudet, M.1
  • 6
    • 38049062912 scopus 로고    scopus 로고
    • Sécurité des protocoles cryptographiques: Aspects logiques et calculatoires
    • Thèse de doctorat, LSV, ENS Cachan, France 2007
    • Baudet, M.: Sécurité des protocoles cryptographiques: aspects logiques et calculatoires. Thèse de doctorat, LSV, ENS Cachan, France (2007)
    • Baudet, M.1
  • 7
    • 70350650355 scopus 로고    scopus 로고
    • Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. Research Report LSV-09-03, Laboratoire Spécification et Vérification, ENS Cachan, France, 28 pages (Feburary 2009)
    • Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. Research Report LSV-09-03, Laboratoire Spécification et Vérification, ENS Cachan, France, 28 pages (Feburary 2009)
  • 8
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Baudet, M., Cortier, V., Kremer, S.: Computationally sound implementations of equational theories against passive adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 652-663. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 9
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • IEEE Comp. Soc. Press, Los Alamitos
    • Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th Computer Security Foundations Workshop (CSFW 2001), pp. 82-96. IEEE Comp. Soc. Press, Los Alamitos (2001)
    • (2001) 14th Computer Security Foundations Workshop (CSFW , pp. 82-96
    • Blanchet, B.1
  • 12
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • IEEE Computer Society Press, Los Alamitos
    • Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In: 18th IEEE Symposium on Logic in Computer Science (LICS 2003). IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) 18th IEEE Symposium on Logic in Computer Science (LICS
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 14
    • 38149055615 scopus 로고    scopus 로고
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), 4790, pp. 196-210. Springer, Heidelberg (2007)
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 196-210. Springer, Heidelberg (2007)
  • 15
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 17
    • 69949112592 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • to appear
    • Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security (to appear) (2008)
    • (2008) Journal of Computer Security
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 18
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.