메뉴 건너뛰기




Volumn , Issue , 2007, Pages 77-86

A complete axiomatization of knowledge and cryptography

Author keywords

[No Author keywords available]

Indexed keywords

AXIOMATIZATION; COMPLETE AXIOMATIZATIONS; COMPUTATIONAL SOUNDNESS; ELECTRONIC PAYMENT; EPISTEMIC LOGIC; FIRST-ORDER; KRIPKE SEMANTICS; PI CALCULUS; SECURITY PROTOCOL VERIFICATION; SECURITY PROTOCOLS; STATIC EQUIVALENCE;

EID: 78650511607     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LICS.2007.4     Document Type: Conference Paper
Times cited : (26)

References (33)
  • 2
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci., 367(1-2):2-32, 2006. (Pubitemid 44649345)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 3
    • 84947720399 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic J. of Computing, 5(4), 1998.
    • (1998) Nordic J. of Computing , vol.5 , Issue.4
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 85031620050 scopus 로고
    • A semantics for a logic of authentication
    • M. Abadi and M. Tuttle. A semantics for a logic of authentication. In PODC'91, pages 201-216, 1991.
    • (1991) PODC'91 , pp. 201-216
    • Abadi, M.1    Tuttle, M.2
  • 6
  • 7
    • 36349037309 scopus 로고    scopus 로고
    • On BAN logics for industrial security protocols
    • N. Agray, W. van der Hoek, and E. P. de Vink. On BAN logics for industrial security protocols. In Proc. CEEMAS, pages 29-36, 2001.
    • (2001) Proc. CEEMAS , pp. 29-36
    • Agray, N.1    Van Der Hoek, W.2    De Vink, E.P.3
  • 8
    • 0025641513 scopus 로고
    • A logic of communication in hostile environments
    • IEEE Computer Society Press
    • P. Bieber. A logic of communication in hostile environments. In CSFW III, pages 14-22. IEEE Computer Society Press, 1990.
    • (1990) CSFW III , pp. 14-22
    • Bieber, P.1
  • 9
    • 47849091109 scopus 로고    scopus 로고
    • First-order modal logic
    • F. W. Patrick Blackburn, Johan van Benthem, editor Elsevier
    • T. Brauner and S. Ghilardi. First-order modal logic. In F. W. Patrick Blackburn, Johan van Benthem, editor, Handbook of Modal Logic: Volume III. Elsevier, 2006.
    • (2006) Handbook of Modal Logic , vol.3
    • Brauner, T.1    Ghilardi, S.2
  • 11
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 12
    • 60349103014 scopus 로고    scopus 로고
    • A completeness result for BAN logic
    • M. Cohen and M. Dam. A completeness result for BAN logic. In Proc. M4M'05, pages 202-219, 2005.
    • (2005) Proc. M4M'05 , pp. 202-219
    • Cohen, M.1    Dam, M.2
  • 13
    • 49049083577 scopus 로고    scopus 로고
    • Logical omniscience in the semantics of BAN logic
    • M. Cohen and M. Dam. Logical omniscience in the semantics of BAN logic. In Proc. FCS'05, pages 121-132, 2005.
    • (2005) Proc. FCS'05 , pp. 121-132
    • Cohen, M.1    Dam, M.2
  • 14
    • 49049103044 scopus 로고    scopus 로고
    • A complete axiomatization of knowledge and cryptography
    • KTH CSC
    • M. Cohen and M. Dam. A complete axiomatization of knowledge and cryptography. Research report TRITA-CSC-TCS-2007:1, KTH CSC, 2007. http://web.it.kth.se/~mfd/TRITACSCTCS1.pdf.
    • (2007) Research Report TRITA-CSC-TCS-2007 , vol.1
    • Cohen, M.1    Dam, M.2
  • 15
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Comput. Secur., 11(4):677-721, 2004.
    • (2004) J. Comput. Secur. , vol.11 , Issue.4 , pp. 677-721
    • Durgin, N.1    Mitchell, J.2    Pavlovic, D.3
  • 17
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • C. Fournet and M. Abadi. Mobile values, new names, and secure communication. In Proc. POPL'01, pages 104-115, 2001.
    • (2001) Proc. POPL'01 , pp. 104-115
    • Fournet, C.1    Abadi, M.2
  • 19
    • 0002399785 scopus 로고
    • Quantification in modal logic
    • D. Gabbay and F. Guenthner, editors Reidel
    • J. W. Garson. Quantification in modal logic. In D. Gabbay and F. Guenthner, editors, Handbook of Philosophical Logic: Volume II. Reidel, 1984.
    • (1984) Handbook of Philosophical Logic , vol.2
    • Garson, J.W.1
  • 20
  • 21
    • 33646018220 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • J. Halpern and K. O'Neill. Anonymity and information hiding in multiagent systems. In Proc. CSFW'03, pages 75-88, 2003.
    • (2003) Proc. CSFW'03 , pp. 75-88
    • Halpern, J.1    O'Neill, K.2
  • 22
    • 84885649872 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for security protocol analysis
    • J. Y Halpern and R. Pucella. Modeling adversaries in a logic for security protocol analysis. In Proc. FASec, pages 115-132, 2002.
    • (2002) Proc. FASec , pp. 115-132
    • Halpern, J.Y.1    Pucella, R.2
  • 24
    • 0007616285 scopus 로고
    • Counterpart theory and quantified modal logic
    • D. Lewis. Counterpart theory and quantified modal logic. Journal of Philosophy, 65:113-126, 1968.
    • (1968) Journal of Philosophy , vol.65 , pp. 113-126
    • Lewis, D.1
  • 27
    • 85007180552 scopus 로고
    • Distributed processes and the logic of knowledge
    • R. Parikh and R. Ramanujam. Distributed processes and the logic of knowledge. In Logic of Programs, pages 256-268, 1985.
    • (1985) Logic of Programs , pp. 256-268
    • Parikh, R.1    Ramanujam, R.2
  • 30
    • 4944250729 scopus 로고    scopus 로고
    • Symbolic model checking the knowledge of the dining cryptographers
    • K. S. Ron van der Meyden. Symbolic model checking the knowledge of the dining cryptographers. In Proc. CSFW'04, 2004.
    • (2004) Proc. CSFW'04
    • Ron Van Der Meyden, K.S.1
  • 33
    • 82755165301 scopus 로고
    • Reasoning about cryptographic protocols
    • J. Feigenbaum and M. Merritt, editors
    • M.-J. Toussaint and P. Wolper. Reasoning about cryptographic protocols. In J. Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, pages 245-262. 1989.
    • (1989) Distributed Computing and Cryptography , pp. 245-262
    • Toussaint, M.-J.1    Wolper, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.