메뉴 건너뛰기




Volumn 19, Issue 4, 2009, Pages 463-487

Automatic verification of temporal-epistemic properties of cryptographic protocols

Author keywords

Epistemic Logic; Model Checking; Security Protocols

Indexed keywords


EID: 78650512700     PISSN: 11663081     EISSN: 19585780     Source Type: Journal    
DOI: 10.3166/jancl.19.463-487     Document Type: Article
Times cited : (21)

References (42)
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum D., "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", Journal of Cryptology, vol. 1, num. 1, pp. 65-75, 1988
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 18
    • 0141528667 scopus 로고    scopus 로고
    • A logical reconstruction of SPKI
    • Halpern J. Y., Meyden R., "A logical reconstruction of SPKI", Journal of Computer Security, vol. 11, num. 4, pp. 581-613, 2004
    • (2004) Journal of Computer Security , vol.11 , Issue.4 , pp. 581-613
    • Halpern, J.Y.1    Meyden, R.2
  • 19
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • Heather J., Lowe G., Schneider S., "How to Prevent Type Flaw Attacks on Security Protocols", Journal of Computer Security, vol. 11, num. 2, pp. 217-244, 2003
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 20
    • 33747048946 scopus 로고    scopus 로고
    • Comparing BDD and SAT based techniques for model checking chaums dining cryptographers protocol
    • Kacprzak M., Lomuscio A., Niewiadomski A., PenczekW., Raimondi F., Szreter M., "Comparing BDD and SAT based techniques for model checking Chaum?s Dining Cryptographers Protocol", Fundamenta Informaticae, vol. 72, num. 1-3, pp. 215-234, 2006
    • (2006) Fundamenta Informaticae , vol.72 , Issue.1-3 , pp. 215-234
    • Kacprzak, M.1    Lomuscio, A.2    Penczekw, N.A.3    Raimondi, F.4    Szreter, M.5
  • 23
    • 84887430467 scopus 로고    scopus 로고
    • Laboratoire Spécification et Vérification ENS Cachan, SPORE: Security Protocols Open Repository
    • Laboratoire Spécification et Vérification ENS Cachan, "SPORE: Security Protocols Open Repository", http://www.lsv.ens- cachan.fr/spore/index.html, 2003
    • (2003)
  • 24
    • 67650450119 scopus 로고    scopus 로고
    • LDYIS: A framework for model checking security protocols
    • Lomuscio A., Penczek W., "LDYIS: a framework for model checking security protocols", Fundamenta Informaticae, vol. 85, pp. 359-375, 2008
    • (2008) Fundamenta Informaticae , vol.85 , pp. 359-375
    • Lomuscio, A.1    Penczek, W.2
  • 26
    • 34548656983 scopus 로고    scopus 로고
    • Verification of the Tesla protocol in MCMAS-X
    • july
    • Lomuscio A., Raimondi F., Wozna B., "Verification of the Tesla protocol in MCMAS-X", Fundamenta Informaticae, vol. 79, num. 3-4, pp. 473-486, july, 2007
    • (2007) Fundamenta Informaticae , vol.79 , Issue.3-4 , pp. 473-486
    • Lomuscio, A.1    Raimondi, F.2    Wozna, B.3
  • 28
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe G., "Casper: A Compiler for the Analysis of Security Protocols", Journal of Computer Security, vol. 6, num. 1-2, pp. 53-84, 1998
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 29
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows C., "The NRL Protocol Analyzer: An Overview", Journal of Logic Programming, vol. 26, pp. 113-131, 1996
    • (1996) Journal of Logic Programming , vol.26 , pp. 113-131
    • Meadows, C.1
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., Schroeder M., "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, pp. 993-999, 1978
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 35
    • 85007180552 scopus 로고
    • Distributed processes and the logic of knowledge
    • Parikh R., Ramanujam R., "Distributed Processes and the Logic of Knowledge", Logic of Programs, pp. 256-268, 1985
    • (1985) Logic of Programs , pp. 256-268
    • Parikh, R.1    Ramanujam, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.