메뉴 건너뛰기




Volumn 6173 LNAI, Issue , 2010, Pages 412-426

Automating security analysis: Symbolic equivalence of constraint systems

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC ENCRYPTION; CONSTRAINT SYSTEMS; CRYPTOGRAPHIC PROTOCOLS; SECURITY ANALYSIS; SECURITY PROPERTIES; SYMBOLIC EQUIVALENCES; TRACE EQUIVALENCE;

EID: 77955258016     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14203-1_35     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006) (Pubitemid 44649345)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 5
    • 70350663117 scopus 로고    scopus 로고
    • YAPA: A generic tool for computing intruder knowledge
    • Treinen, R. (ed.) RTA 2009. Springer, Heidelberg
    • Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148-163. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5595 , pp. 148-163
    • Baudet, M.1    Cortier, V.2    Delaune, S.3
  • 6
    • 77957125845 scopus 로고    scopus 로고
    • An automatic security protocol verifier based on resolution theorem proving
    • invited tutorial. Nieuwenhuis, R. (ed.) CADE 2005. Springer, Heidelberg
    • Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), vol. 3632, Springer, Heidelberg (2005)
    • (2005) LNCS (LNAI) , vol.3632
    • Blanchet, B.1
  • 7
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
    • Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008) (Pubitemid 351172997)
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1 , pp. 3-51
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 10
    • 77955258325 scopus 로고    scopus 로고
    • Ciobâcǎ, Ş.: Kiss (2009), http://www.lsv.ens-cachan. fr/~ciobaca/kiss
    • (2009) Kiss
    • Ciobâcǎ, Ş.1
  • 11
    • 53049101587 scopus 로고    scopus 로고
    • Challenges in the automated verification of security protocols
    • Armando, A., Baumgartner, P., Dowek, G. (eds.) IJCAR 2008. Springer, Heidelberg
    • Comon-Lundh, H.: Challenges in the automated verification of security protocols. In: Armando, A., Baumgartner, P., Dowek, G. (eds.) IJCAR 2008. LNCS (LNAI), vol. 5195, pp. 396-409. Springer, Heidelberg (2008)
    • (2008) LNCS (LNAI) , vol.5195 , pp. 396-409
    • Comon-Lundh, H.1
  • 12
    • 76249100283 scopus 로고    scopus 로고
    • Deciding security properties of cryptographic protocols. application to key cycles
    • Comon-Lundh, H., Cortier, V., Zalinescu, E.: Deciding security properties of cryptographic protocols. application to key cycles. Transaction on Computational Logic 11(2) (2010)
    • Transaction on Computational Logic , vol.11 , Issue.2 , pp. 2010
    • Comon-Lundh, H.1    Cortier, V.2    Zalinescu, E.3
  • 13
    • 13544277438 scopus 로고    scopus 로고
    • Analysing password protocol security against off-line dictionary attacks
    • Corin, R., Doumen, J., Etalle, S.: Analysing password protocol security against off-line dictionary attacks. Electr. Notes Theor. Comput. Sci. 121, 47-63 (2005)
    • (2005) Electr. Notes Theor. Comput. Sci. , vol.121 , pp. 47-63
    • Corin, R.1    Doumen, J.2    Etalle, S.3
  • 15
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • Delaune, S., Kremer, S., Ryan,M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4), 435-487 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 18
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 21
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • Ganzinger, H. (ed.) CADE 1999. Springer, Heidelberg
    • Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
    • (1999) LNCS (LNAI) , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.