메뉴 건너뛰기




Volumn , Issue , 2010, Pages 322-336

Protocol composition for arbitrary primitives

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; DIFFIE HELLMAN; DIFFIE-HELLMAN KEY EXCHANGE PROTOCOL; DISJOINTNESS; DOLEV-YAO MODEL; EQUATIONAL THEORY; EXCLUSIVE-OR; KEY-EXCHANGE PROTOCOL; PROTOCOL COMPOSITION; SECURITY PROTOCOLS;

EID: 77957575144     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.29     Document Type: Conference Paper
Times cited : (38)

References (29)
  • 1
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR, " in Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), ser. LNCS, vol. 1055. Springer-Verlag, 1996, pp. 147-166. (Pubitemid 126050413)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1055 , pp. 147-166
    • Lowe, G.1
  • 4
    • 24344493908 scopus 로고    scopus 로고
    • Computer-Assisted Verification of a Protocol for Certified Email
    • Oct., special issue SAS'03
    • M. Abadi and B. Blanchet, "Computer-Assisted Verification of a Protocol for Certified Email, " Science of Computer Programming, vol. 58, no. 1-2, pp. 3-27, Oct. 2005, special issue SAS'03.
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 35048861871 scopus 로고    scopus 로고
    • Just fast keying in the Pi calculus
    • ser. Lecture Notes on Computer Science, Springer Verlag, Mar.
    • M. Abadi, B. Blanchet, and C. Fournet, "Just Fast Keying in the Pi Calculus, " in 13th European Symposium on Programming (ESOP'04), ser. Lecture Notes on Computer Science, vol. 2986. Springer Verlag, Mar. 2004, pp. 340-354.
    • (2004) 13th European Symposium on Programming (ESOP'04) , vol.2986 , pp. 340-354
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 7
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions and composed keys is NP-complete
    • M. Rusinowitch and M. Turuani, "Protocol insecurity with finite number of sessions and composed keys is NP-complete, " Theoretical Computer Science, vol. 299, pp. 451-475, 2003.
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society Press, June
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules, " in 14th Computer Security Foundations Workshop (CSFW'01). IEEE Computer Society Press, June 2001.
    • (2001) 14th Computer Security Foundations Workshop (CSFW'01)
    • Blanchet, B.1
  • 9
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE Computer Society Press
    • G. Lowe, "Casper: A compiler for the analysis of security protocols, " in 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press, 1997.
    • (1997) 10th Computer Security Foundations Workshop (CSFW'97)
    • Lowe, G.1
  • 10
    • 77957125845 scopus 로고    scopus 로고
    • An automatic security protocol verifier based on resolution theorem proving (invited tutorial)
    • July
    • B. Blanchet, "An automatic security protocol verifier based on resolution theorem proving (invited tutorial), " in 20th International Conference on Automated Deduction (CADE- 20), July 2005.
    • (2005) 20th International Conference on Automated Deduction (CADE- 20)
    • Blanchet, B.1
  • 11
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • M. Backes, M. Maffei, and D. Unruh, "Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, " in IEEE Symposium on Security and Privacy, 2008, pp. 202-215.
    • (2008) IEEE Symposium on Security and Privacy , pp. 202-215
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 12
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacytype properties of electronic voting protocols
    • Jul.
    • S. Delaune, S. Kremer, and M. D. Ryan, "Verifying privacytype properties of electronic voting protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 435-487, Jul. 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 21
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. J. T. Fábrega, "Strand spaces: proving security protocols correct, " J. Comput. Secur., vol. 7, no. 2-3, pp. 191-230, 1999.
    • (1999) J. Comput. Secur. , vol.7 , Issue.2-3 , pp. 191-230
    • Fábrega, F.J.T.1
  • 22
  • 27
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in IEEE Symposium on Foundations of Computer Science, 2001, pp. 136-145.
    • (2001) IEEE Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 28
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • R. Canetti and T. Rabin, "Universal composition with joint state, " in CRYPTO, 2003, pp. 265-281.
    • (2003) CRYPTO , pp. 265-281
    • Canetti, R.1    Rabin, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.