메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 71-84

Decidability of opacity with nonatomic keys

Author keywords

Decidability; Dolev Yao Constraints; Formal Verification; Opacity; Rewriting Systems; Security

Indexed keywords

COMPUTABILITY AND DECIDABILITY; FORMAL VERIFICATION; SYNTACTICS;

EID: 78649476961     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_6     Document Type: Conference Paper
Times cited : (18)

References (15)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • In, Sendai, Japan. Springer-Verlag, Berlin Germany
    • Abadi, M. and Rogaway, P. (2000). Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), Sendai, Japan. Springer-Verlag, Berlin Germany.
    • (2000) IFIP International Conference on Theoretical Computer Science (IFIP TCS2000)
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 14044257155 scopus 로고    scopus 로고
    • Avispa
    • Avispa (1999). The Avispa Project, http://www.avispa-project.org/.
    • (1999) The Avispa Project
  • 5
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • In
    • Clarke, E., Jha, S., and Marrero, W. (1998). Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In IFIP Working Conference on Programming Concepts and Methods.
    • (1998) IFIP Working Conference on Programming Concepts and Methods.
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 7
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • In, volume 2706 of LNCS
    • Comon-Lundh, H. and Cortier, V. (2003). New decidability results for fragments of first-order logic and application to cryptographic protocols. In 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS.
    • (2003) 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003)
    • Comon-Lundh, H.1    Cortier, V.2
  • 12
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes, D. and Shmatikov, V. (2004). Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security, 12(1):3-36.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.