메뉴 건너뛰기




Volumn , Issue , 2011, Pages 321-330

Trace equivalence decision: Negative tests and non-determinism

Author keywords

Security; Verification

Indexed keywords

APPLIED PI CALCULUS; CONSTRAINT SYSTEMS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; GENERAL CLASS; NON-DETERMINISM; PRIVATE CHANNELS; SECURITY; SECURITY PROPERTIES; SYMBOLIC EQUIVALENCES; SYMBOLIC SEMANTICS; TRACE EQUIVALENCE; UNLINKABILITY;

EID: 80755168342     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046744     Document Type: Conference Paper
Times cited : (52)

References (25)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. Theoretical Computer Science, 387(1-2):2-32, 2006. (Pubitemid 44649345)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 7
    • 33745778843 scopus 로고    scopus 로고
    • Deciding security of protocols against off-line guessing attacks
    • DOI 10.1145/1102120.1102125, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • M. Baudet. Deciding security of protocols against off-line guessing attacks. In Proc. 12th Conference on Computer and Communications Security (CCS'05), pages 16-25. ACM Press, 2005. (Pubitemid 44021986)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 16-25
    • Baudet, M.1
  • 9
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. 14th Computer Security Foundations Workshop (CSFW'01), pages 82-96. IEEE Comp. Soc. Press, 2001. (Pubitemid 32877779)
    • (2001) Proceedings of the Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 10
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
    • B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008. (Pubitemid 351172997)
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1 , pp. 3-51
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 13
    • 24944569389 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
    • H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proc. 16th International Conference on Rewriting Techniques and Applications (RTA'05), LNCS, pages 294-307. Springer, 2005. (Pubitemid 41313364)
    • (2005) Lecture Notes in Computer Science , vol.3467 , pp. 294-307
    • Comon-Lundh, H.1    Delaune, S.2
  • 16
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • July
    • S. Delaune, S. Kremer, and M. D. Ryan. Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 17(4):435-487, July 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 18
    • 3042538976 scopus 로고    scopus 로고
    • Automatic testing equivalence verification of spi calculus specifications
    • DOI 10.1145/941566.941570
    • L. Durante, R. Sisto, and A. Valenzano. Automatic testing equivalence verification of spi calculus specifications. ACM Transactions on Software Engineering and Methodology, 12(2):222-284, 2003. (Pubitemid 44159309)
    • (2003) ACM Transactions on Software Engineering and Methodology , vol.12 , Issue.2 , pp. 222-284
    • Durante, L.1    Sisto, R.2    Valenzano, A.3
  • 22
    • 77954697164 scopus 로고    scopus 로고
    • Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
    • S. Mödersheim, L. Viganò, and D. A. Basin. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618, 2010.
    • (2010) Journal of Computer Security , vol.18 , Issue.4 , pp. 575-618
    • Mödersheim, S.1    Viganò, L.2    Basin, D.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.