메뉴 건너뛰기




Volumn 5983 LNCS, Issue , 2010, Pages 263-278

A user interface for a game-based protocol verification tool

Author keywords

[No Author keywords available]

Indexed keywords

PROGRAM DEPENDENCY GRAPHS; PROTOCOL ANALYZERS; PROTOCOL VERIFICATION; SECURITY PROPERTIES; USER INTERACTION;

EID: 77953257824     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12459-4_19     Document Type: Conference Paper
Times cited : (3)

References (39)
  • 2
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL 2001, pp. 104-115 (2001)
    • (2001) POPL 2001 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 3
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. Springer, Heidelberg
    • Abadi, M., Jürjens, J.: Formal eavesdropping and its computational interpretation. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol. 2215, pp. 82-94. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 4
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2), 103-127 (2002)
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 58049108667 scopus 로고    scopus 로고
    • A formal language for cryptographic pseudocode
    • Cervesato, I., Veith, H., Voronkov, A. (eds) LPAR 2008. Springer, Heidelberg
    • Backes, M., Berg, M., Unruh, D.: A formal language for cryptographic pseudocode. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS (LNAI), vol. 5330, pp. 353-376. Springer, Heidelberg (2008)
    • (2008) LNCS (LNAI) , vol.5330 , pp. 353-376
    • Backes, M.1    Berg, M.2    Unruh, D.3
  • 6
    • 34547340512 scopus 로고    scopus 로고
    • Computationally sound secrecy proofs by mechanized flow analysis
    • Backes, M., Laud, P.: Computationally sound secrecy proofs by mechanized flow analysis. In: ACM CCS 2006, pp. 370-379 (2006)
    • (2006) ACM CCS 2006 , pp. 370-379
    • Backes, M.1    Laud, P.2
  • 7
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: ACM CCS 2003, pp. 220-230 (2003)
    • (2003) ACM CCS 2003 , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 8
    • 0025444592 scopus 로고
    • The program dependence web: A representation supporting control, data, and demand-driven interpretation of imperative languages
    • Ballance, R.A., Maccabe, A.B., Ottenstein, K.J.: The program dependence web: A representation supporting control, data, and demand-driven interpretation of imperative languages. In: PLDI 1990, pp. 257-271 (1990)
    • (1990) PLDI 1990 , pp. 257-271
    • Ballance, R.A.1    Maccabe, A.B.2    Ottenstein, K.J.3
  • 9
    • 70350323754 scopus 로고    scopus 로고
    • Formal certification of code-based cryptographic proofs
    • Barthe, G., Grégoire, B., Béguelin, S.Z.: Formal certification of code-based cryptographic proofs. In: POPL 2009, pp. 90-101 (2009)
    • (2009) POPL 2009 , pp. 90-101
    • Barthe, G.1    Grégoire, B.2    Béguelin, S.Z.3
  • 10
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-535. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-535
    • Bellare, M.1    Namprempre, C.2
  • 11
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 12
    • 33749579009 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE S&P 2006, pp. 140-154 (2006)
    • (2006) IEEE S&P 2006 , pp. 140-154
    • Blanchet, B.1
  • 13
    • 77953261452 scopus 로고    scopus 로고
    • A Computationally Sound Mechanized Prover for Security Protocols
    • Report 2005/401 February 2
    • Blanchet, B.: A Computationally Sound Mechanized Prover for Security Protocols. Cryptology ePrint Archive, Report 2005/401 (February 2, 2007)
    • (2007) Cryptology ePrint Archive
    • Blanchet, B.1
  • 14
    • 33746332058 scopus 로고    scopus 로고
    • A probabilistic hoare-style logic for game-based cryptographic proofs
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
    • Corin, R., den Hartog, J.: A probabilistic hoare-style logic for game-based cryptographic proofs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 252-263. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 252-263
    • Corin, R.1    Den Hartog, J.2
  • 15
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. Springer, Heidelberg
    • Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 16
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Sagiv, M. (ed.) ESOP 2005. Springer, Heidelberg
    • Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 17
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. Springer, Heidelberg
    • Datta, A., Derek, A., Mitchell, J.C., Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Shmatikov, V.4    Turuani, M.5
  • 18
    • 33947704230 scopus 로고    scopus 로고
    • Computationally sound compositional logic for key exchange protocols
    • Datta, A., Derek, A., Mitchell, J.C., Warinschi, B.: Computationally sound compositional logic for key exchange protocols. In: CSFW 2006, pp. 321-334 (2006)
    • (2006) CSFW 2006 , pp. 321-334
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Warinschi, B.4
  • 20
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • Fournet, C., Rezk, T.: Cryptographically sound implementations for typed information-flow security. In: POPL 2008, pp. 323-335 (2008)
    • (2008) POPL 2008 , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 21
    • 33845661990 scopus 로고
    • Demonstration of the interactive graph-visualization system vinci
    • Tamassia, R., Tollis, I.G. (eds.) GD 1994. Springer, Heidelberg
    • Fröhlich, M., Werner, M.: Demonstration of the interactive graph-visualization system vinci. In: Tamassia, R., Tollis, I.G. (eds.) GD 1994. LNCS, vol. 894, pp. 266-269. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.894 , pp. 266-269
    • Fröhlich, M.1    Werner, M.2
  • 22
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
    • Janvier, R., Lakhnech, Y., Mazaré, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005) (Pubitemid 41274057)
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazare, L.3
  • 23
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Sands, D. (ed.) ESOP 2001. Springer, Heidelberg
    • Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 77-91. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 24
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Degano, P. (ed.) ESOP 2003. Springer, Heidelberg
    • Laud, P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 159-173. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 25
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • Laud, P.: Symmetric encryption in automatic analyses for confidentiality against active adversaries. In: IEEE S&P 2004, pp. 71-85 (2004)
    • (2004) IEEE S&P 2004 , pp. 71-85
    • Laud, P.1
  • 26
    • 33745787443 scopus 로고    scopus 로고
    • Secrecy types for a simulatable cryptographic library
    • Laud, P.: Secrecy types for a simulatable cryptographic library. In: ACM CCS 2005, pp. 26-35 (2005)
    • (2005) ACM CCS 2005 , pp. 26-35
    • Laud, P.1
  • 27
    • 26844509701 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. Springer, Heidelberg
    • Laud, P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 365-377. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3623 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 28
    • 0032218226 scopus 로고    scopus 로고
    • A probabilistic poly-time framework for protocol analysis
    • Lincoln, P., Mitchell, J.C., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: ACM CCS 1998, pp. 112-121 (1998)
    • (1998) ACM CCS 1998 , pp. 112-121
    • Lincoln, P.1    Mitchell, J.C.2    Mitchell, M.3    Scedrov, A.4
  • 29
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of Formal Encryption in the Presence of Active Adversaries
    • Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004) (Pubitemid 38236623)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 30
    • 38148999450 scopus 로고    scopus 로고
    • A framework for game-based security proofs
    • Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
    • Nowak, D.: A framework for game-based security proofs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 319-333. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4861 , pp. 319-333
    • Nowak, D.1
  • 31
    • 84984058313 scopus 로고
    • Dependence flow graphs: An algebraic approach to program dependencies
    • Pingali, K., Beck, M., Johnson, R., Moudgill, M., Stodghill, P.: Dependence flow graphs: An algebraic approach to program dependencies. In: POPL 1991, pp. 67-78 (1991)
    • (1991) POPL 1991 , pp. 67-78
    • Pingali, K.1    Beck, M.2    Johnson, R.3    Moudgill, M.4    Stodghill, P.5
  • 32
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/
    • (2004) Cryptology ePrint Archive
    • Shoup, V.1
  • 33
    • 34547244658 scopus 로고    scopus 로고
    • Secure information flow with random assignment and encryption
    • Smith, G.: Secure information flow with random assignment and encryption. In: FMSE 2006, pp. 33-44 (2006)
    • (2006) FMSE 2006 , pp. 33-44
    • Smith, G.1
  • 35
    • 51749114905 scopus 로고    scopus 로고
    • Cryptographically-sound protocol-model abstractions
    • Sprenger, C., Basin, D.A.: Cryptographically-sound protocol-model abstractions. In: CSF 2008, pp. 115-129 (2008)
    • (2008) CSF 2008 , pp. 115-129
    • Sprenger, C.1    Basin, D.A.2
  • 37
    • 41549155487 scopus 로고    scopus 로고
    • Application of dependency graphs to security protocol analysis
    • Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. Springer, Heidelberg
    • Tšahhirov, I., Laud, P.: Application of dependency graphs to security protocol analysis. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 294-311. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4912 , pp. 294-311
    • Tšahhirov, I.1    Laud, P.2
  • 38
    • 77953265389 scopus 로고    scopus 로고
    • uDraw(Graph) graph visualizer (2005), http://www.informatik.uni-bremen. de/uDrawGraph/en/index.html
    • (2005) UDraw(Graph) Graph Visualizer
  • 39
    • 0033683194 scopus 로고    scopus 로고
    • Secure introduction of one-way functions
    • Volpano, D.M.: Secure introduction of one-way functions. In: CSFW 2000, pp. 246-254 (2000)
    • (2000) CSFW 2000 , pp. 246-254
    • Volpano, D.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.