메뉴 건너뛰기




Volumn 89 CCIS, Issue , 2010, Pages 152-163

Comparative analysis of formal model checking tools for security protocol verification

Author keywords

Falsification; Formal Methods; Security Protocols; State Exploration; Verification

Indexed keywords

COMPARATIVE ANALYSIS; FALSIFICATION; FORMAL APPROACH; FORMAL MODEL; SECURITY PROTOCOL VERIFICATION; SECURITY PROTOCOLS; STATE EXPLORATION;

EID: 77957551809     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-14478-3_16     Document Type: Conference Paper
Times cited : (27)

References (27)
  • 2
    • 77952332440 scopus 로고    scopus 로고
    • Formal support to security protocol development: A survey
    • Juan Carlos, L.P., Monroy, R.: Formal support to security protocol development: A survey. Computacion y Sistemas 12(1), 89-108 (2008)
    • (2008) Computacion y Sistemas , vol.12 , Issue.1 , pp. 89-108
    • Juan Carlos, L.P.1    Monroy, R.2
  • 6
    • 77957576551 scopus 로고    scopus 로고
    • Overview of security protocol analysis
    • Chen, Q., Zhang, C., Zhang, S. (eds.) Springer, Heidelberg
    • Chen, Q., Zhang, C., Zhang, S.: Overview of security protocol analysis. In: Chen, Q., Zhang, C., Zhang, S. (eds.) Secure Transaction Protocol Analysis. LNCS, vol. 5111, pp. 17-72. Springer, Heidelberg (2008)
    • (2008) Secure Transaction Protocol Analysis. LNCS , vol.5111 , pp. 17-72
    • Chen, Q.1    Zhang, C.2    Zhang, S.3
  • 8
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131-133 (1995)
    • (1995) Inf. Process. Lett. , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 9
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 53-84 (1998)
    • (1998) Journal of Computer Security , pp. 53-84
    • Lowe, G.1
  • 10
    • 19744367735 scopus 로고    scopus 로고
    • Ofmc: A symbolic model checker for security protocols
    • Basin, D.A., Mödersheim, S., Viganò, L.: Ofmc: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3), 181-208 (2005)
    • (2005) Int. J. Inf. Sec. , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.A.1    Mödersheim, S.2    Viganò, L.3
  • 14
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the avispa tool
    • Vigan, L.: Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science 155, 61-86 (2006)
    • (2006) Electronic Notes in Theoretical Computer Science , vol.155 , pp. 61-86
    • Vigan, L.1
  • 16
    • 35248837934 scopus 로고    scopus 로고
    • Hermes: An automatic tool for verification of secrecy in security protocols
    • Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003, Springer, Heidelberg
    • Bozga, L., Lakhnech, Y., Périn, M.: Hermes: An automatic tool for verification of secrecy in security protocols. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 219-222. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2725 , pp. 219-222
    • Bozga, L.1    Lakhnech, Y.2    Périn, M.3
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The nrl protocol analyzer: An overview
    • Meadows, C.: The nrl protocol analyzer: An overview. The Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) The Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.