메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 303-318

Sequential protocol composition in Maude-NPA

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; MULTI AGENT SYSTEMS;

EID: 78049354833     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_19     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 2
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: STOC, pp. 494-503 (2002)
    • (2002) STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 7
    • 0013398251 scopus 로고
    • Major security problems with the "unforgeable" (Feige-) fiat-shamir proofs of identity and how to overcome them
    • Paris, France, March 1988
    • Desmedt, Y.: Major security problems with the "unforgeable" (Feige-) Fiat-Shamir Proofs of identity and how to overcome them. In: Securicom 88, 6th Worldwide Congress on Computer and Communications Security and Protection, Paris, France, March 1988, pp. 147-159 (1988)
    • (1988) Securicom 88, 6th Worldwide Congress on Computer and Communications Security and Protection , pp. 147-159
    • Desmedt, Y.1
  • 8
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • Grumberg, O., Huth, M. eds., Springer, Heidelberg
    • Doghim, S., Guttman, J., Thayer, F. J.: Searching for Shapes in Cryptographic Protocols. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 523-537. Springer, Heidelberg (2007)
    • (2007) TACAS 2007. LNCS , vol.4424 , pp. 523-537
    • Doghim, S.1    Guttman, J.2    Thayer, F.J.3
  • 9
    • 0034834930 scopus 로고    scopus 로고
    • A compositional logic for program correctness
    • Cape Breton, NS, Canada, June 11-13, IEEE Computer Society Press, Los Alamitos
    • Durgin, N., Mitchell, J., Pavlovic, D.: A Compositional Logic for Program Correctness. In: Fifteenth Computer Security Foundations Workshop - CSFW-14, Cape Breton, NS, Canada, June 11-13, IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Fifteenth Computer Security Foundations Workshop - CSFW-14
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 10
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
    • Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367 (1-2), 162-202 (2006)
    • (2006) Theor. Comput. Sci. , vol.367 , Issue.1-2 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 11
    • 70349314888 scopus 로고    scopus 로고
    • Maude-NPA: Cryptographic protocol analysis modulo equational properties
    • Springer, Heidelberg
    • Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic protocol analysis modulo equational properties. In: FOSAD 2008/2009 Tutorial Lectures, vol. 5705, pp. 1-50. Springer, Heidelberg (2009)
    • (2009) FOSAD 2008/2009 Tutorial Lectures , vol.5705 , pp. 1-50
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 15
    • 85165846432 scopus 로고    scopus 로고
    • Security protocol design via authentication tests
    • IEEE Computer Society Press, Los Alamitos
    • Guttman, J.: Security protocol design via authentication tests. In: Proc. Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proc. Computer Security Foundations Workshop
    • Guttman, J.1
  • 17
    • 0033714403 scopus 로고    scopus 로고
    • Protocol independence through disjoint encryption
    • Guttman, J. D., Thayer, F. J.: Protocol independence through disjoint encryption. In: CSFW, pp. 24-34 (2000)
    • (2000) CSFW , pp. 24-34
    • Guttman, J.D.1    Thayer, F.J.2
  • 18
    • 0003272021 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • November
    • Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409 (November 1998)
    • (1998) IETF RFC 2409
    • Harkins, D.1    Carrel, D.2
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996) (Pubitemid 126050413)
    • (1996) Lecture Notes in Computer Science , Issue.1055 , pp. 147-166
    • Lowe, G.1
  • 20
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci. 96(1), 73-155 (1992)
    • (1992) Theor. Comput. Sci. , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 21
    • 84957873927 scopus 로고    scopus 로고
    • Membership algebra as a logical framework for equational specification
    • Parisi-Presicce, F. ed., Springer, Heidelberg
    • Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18-61. Springer, Heidelberg (1998)
    • (1998) WADT 1997. LNCS , vol.1376 , pp. 18-61
    • Meseguer, J.1
  • 22
    • 1242286270 scopus 로고    scopus 로고
    • TeReSe ed.:, Cambridge University Press, Cambridge
    • TeReSe (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)
    • (2003) Term Rewriting Systems


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.