메뉴 건너뛰기




Volumn , Issue , 2007, Pages 61-70

Selecting theories and nonce generation for recursive protocols

Author keywords

Automatic analysis; Decidability; Security protocols

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTOMATIC ANALYSIS; CRYPTOGRAPHIC PROTOCOLS; EXTENDED MODEL; FINITE NUMBER; RECURSIVE PROTOCOLS; SECURITY PROTOCOLS; SELECTING THEORIES; SESSION KEY;

EID: 77952325597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314436.1314445     Document Type: Conference Paper
Times cited : (19)

References (18)
  • 3
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • of Lecture Notes in Computer Science, Springer
    • H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In Proceedings of the 14th Internatioinal Conference on Rewriting Techniques and Applications (RTA 2003), volume 2706 of Lecture Notes in Computer Science, pages 148-164. Springer, 2003.
    • (2003) Proceedings of the 14th Internatioinal Conference on Rewriting Techniques and Applications (RTA 2003) , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 5
    • 0005240447 scopus 로고    scopus 로고
    • A cryptographic evaluation of IPsec
    • Available from
    • N. Ferguson and B. Schneier. A Cryptographic Evaluation of IPsec. Technical report, 2000. Available from http://www.counterpane.com/ipsecpdf.
    • (2000) Technical Report
    • Ferguson, N.1    Schneier, B.2
  • 7
    • 77952341753 scopus 로고    scopus 로고
    • Selecting theories and nonce generation for recursive protocols
    • Institut für Informatik, CAU Kiel, Germany
    • K. O. Kürtz. Selecting Theories and Nonce Generation for Recursive Protocols. Technical Report 0709, Institut für Informatik, CAU Kiel, Germany, 2007.
    • (2007) Technical Report 0709
    • Kürtz, K.O.1
  • 8
    • 84874721799 scopus 로고    scopus 로고
    • On the decidability of cryptographic protocols with open-ended data structures
    • L. Brim, P. Jancar, M. Kretinsky, and A. Kucera, editors, of Lecture Notes in Computer Science, Springer-Verlag
    • R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. In L. Brim, P. Jancar, M. Kretinsky, and A. Kucera, editors, 13th International Conference on Concurrency Theory (CONCUR 2002), volume 2421 of Lecture Notes in Computer Science, pages 515-530. Springer-Verlag, 2002.
    • (2002) 13th International Conference on Concurrency Theory (CONCUR 2002) , vol.2421 , pp. 515-530
    • Küsters, R.1
  • 9
    • 14844295030 scopus 로고    scopus 로고
    • On the decidability of cryptographic protocols with open-ended data structures
    • DOI 10.1007/s10207-004-0050-z
    • R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. International Journal of Information Security, 4 (1-2): 49-70, 2005. Online publication appeared 2004. DOI: 10.1007/s10207-004- 0050-z. (Pubitemid 40347201)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 49-70
    • Kusters, R.1
  • 10
    • 35048832860 scopus 로고    scopus 로고
    • Automata-based analysis of recursive cryptographic protocols
    • V. Diekert and M. Habib, editors, of Lecture Notes in Computer Science, Springer-Verlag
    • R. Küsters and T. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. In V. Diekert and M. Habib, editors, 21st Symposium on Theoretical Aspects of Computer Science (STACS 2004), volume 2996 of Lecture Notes in Computer Science, pages 382-393. Springer-Verlag, 2004.
    • (2004) 21st Symposium on Theoretical Aspects of Computer Science (STACS 2004) , vol.2996 , pp. 382-393
    • Küsters, R.1    Wilke, T.2
  • 11
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press
    • C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
    • (2000) Proceedings of DISCEX 2000 , pp. 237-250
    • Meadows, C.1
  • 13
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • January
    • D. Otway and O. Rees. Efficient and timely mutual authentication. Operating Systems Review, 21 (1):8-10, January 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 14
    • 35548966087 scopus 로고    scopus 로고
    • On the automatic analysis of recursive security protocols with XOR
    • W. Thomas and P. Weil, editors, of Lecture Notes in Computer Science. Springer
    • R. Küsters and T. Truderung. On the Automatic Analysis of Recursive Security Protocols with XOR. In W. Thomas and P. Weil, editors, Proceedings of the 24th Symposium on Theoretical Aspects of Computer Science (STACS 2007), volume 4393 of Lecture Notes in Computer Science. Springer, 2007.
    • (2007) Proceedings of the 24th Symposium on Theoretical Aspects of Computer Science (STACS 2007) , vol.4393
    • Küsters, R.1    Truderung, T.2
  • 15
    • 26944479976 scopus 로고    scopus 로고
    • Regular protocols and attacks with regular knowledge
    • R. Nieuwenhuis, editor, of Lecture Notes in Computer Science, Springer-Verlag
    • T. Truderung. Regular protocols and attacks with regular knowledge. In R. Nieuwenhuis, editor, Proceedings of the 20th International Conference on Automated Deduction (CADE 2005), volume 3328 of Lecture Notes in Computer Science, pages 377-391. Springer-Verlag, 2005.
    • (2005) Proceedings of the 20th International Conference on Automated Deduction (CADE 2005) , vol.3328 , pp. 377-391
    • Truderung, T.1
  • 16
    • 27344455431 scopus 로고    scopus 로고
    • Selecting theories and recursive protocols
    • M. Abadi and L. de Alfaro, editors, of Lecture Notes in Computer Science, Springer-Verlag
    • T. Truderung. Selecting theories and recursive protocols. In M. Abadi and L. de Alfaro, editors, Proceedings of the 16th International Conference on Concurrency Theory (CONCUR 2005), volume 3653 of Lecture Notes in Computer Science, pages 217-232. Springer-Verlag, 2005.
    • (2005) Proceedings of the 16th International Conference on Concurrency Theory (CONCUR 2005) , vol.3653 , pp. 217-232
    • Truderung, T.1
  • 18
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • J. Zhou. Fixing a security flaw in IKE protocols. Electronic Letter, 35 (13):1072-1073, 1999.
    • (1999) Electronic Letter , vol.35 , Issue.13 , pp. 1072-1073
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.