메뉴 건너뛰기




Volumn , Issue , 2005, Pages 67-80

Formal prototyping in early stages of protocol design

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN ITERATION; EXECUTABLE SPECIFICATIONS; PROTOCOL DESIGN; PROTOTYPE IMPLEMENTATIONS; PROTOTYPING; SECURITY ASSOCIATION; SECURITY PROTOCOLS; SIMULATION-BASED; SUCCESSIVE ITERATION;

EID: 77953980529     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1045405.1045413     Document Type: Conference Paper
Times cited : (20)

References (31)
  • 1
    • 35048861871 scopus 로고    scopus 로고
    • Just Fast Keying in the Pi Calculus
    • D. Schmidt, editor, The European Symposium on Programming (ESOP), Springer-Verlag
    • M. Abadi, B. Blanchet, and C. Fournet. Just Fast Keying in the Pi Calculus. In D. Schmidt, editor, The European Symposium on Programming (ESOP), Lecture Notes inComputer Science 2618. Springer-Verlag, 2004.
    • (2004) Lecture Notes inComputer Science , vol.2618
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols: The Spi Calculus
    • M. Abadi and A. Gordan. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordan, A.2
  • 6
    • 77954002789 scopus 로고    scopus 로고
    • Routing information protocol in HOL/SPIN
    • J. Harrison and M. Aagaard, editors, Theorem Proving in Higher Order Logics: 13th International Conference, TPHOLs 2000 Portland, Oregon, August Springer-Verlag
    • K. Bhargavan, C. A. Gunter, and D. Obradovic. Routing information protocol in HOL/SPIN. In J. Harrison and M. Aagaard, editors, Theorem Proving in Higher Order Logics: 13th International Conference, TPHOLs 2000, volume 1869 of Lecture Notes in Computer Science, pages 53-72, Portland, Oregon, August 2000. Springer-Verlag.
    • (2000) Lecture Notes in Computer Science , vol.1869 , pp. 53-72
    • Bhargavan, K.1    Gunter, C.A.2    Obradovic, D.3
  • 7
    • 0346263728 scopus 로고    scopus 로고
    • Formal verification of standards for distance vector routing protocols
    • July
    • K. Bhargavan, D. Obradovic, and C. A. Gunter. Formal verification of standards for distance vector routing protocols. Journal of the ACM, 49(4):538-576, July 2002.
    • (2002) Journal of the ACM , vol.49 , Issue.4 , pp. 538-576
    • Bhargavan, K.1    Obradovic, D.2    Gunter, C.A.3
  • 8
    • 84958749546 scopus 로고    scopus 로고
    • From Secrecy to Authencity in Security Protocols
    • 9th International Static Analysis Symposium (SAS'02), Springer-Verlag
    • B. Blanchet. From Secrecy to Authencity in Security Protocols. In 9th International Static Analysis Symposium (SAS'02), Lecture Notes In Computer Science 2477, pages 342-359. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 9
    • 3543058869 scopus 로고    scopus 로고
    • Automatic Proof of Strong Secrecy for Security Protocols
    • B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 23
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-Key Auntentication Protocol
    • G. Lowe. An Attack on the Needham-Schroeder Public-Key Auntentication Protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 24
    • 77953971250 scopus 로고    scopus 로고
    • November
    • K. McMillan. The SMV Manual. November 2000, http://www-2.cs.cmu.edu/ ~modelcheck/smv.html.
    • (2000) The SMV Manual
    • McMillan, K.1
  • 27
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • J. Meseguer. Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science, 96:73-155, 1992.
    • (1992) Theoretical Computer Science , vol.96 , pp. 73-155
    • Meseguer, J.1
  • 28
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security, 6:85-128, 1998.
    • (1998) J. Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.