메뉴 건너뛰기




Volumn 7796 LNCS, Issue , 2013, Pages 63-82

Proved generation of implementations from computationally secure protocol specifications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL MODEL; COMPUTATIONAL PROTOCOLS; PROBABILITY P; PROTOCOL SPECIFICATIONS; SECURE PROTOCOLS; SECURITY PROPERTIES; SECURITY PROTOCOLS;

EID: 84874422917     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36830-1_4     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 80755187803 scopus 로고    scopus 로고
    • Extracting and verifying cryptographic models from C protocol code by symbolic execution
    • ACM, New York
    • Aizatulin, M., Gordon, A.D., Jürjens, J.: Extracting and verifying cryptographic models from C protocol code by symbolic execution. In: CCS 2011, pp. 331-340. ACM, New York (2011)
    • (2011) CCS 2011 , pp. 331-340
    • Aizatulin, M.1    Gordon, A.D.2    Jürjens, J.3
  • 2
    • 84869432338 scopus 로고    scopus 로고
    • Computational verification of C protocol implementations by symbolic execution
    • ACM, New York
    • Aizatulin, M., Gordon, A.D., Jürjens, J.: Computational verification of C protocol implementations by symbolic execution. In: CCS 2012, pp. 712-723. ACM, New York (2012)
    • (2012) CCS 2012 , pp. 712-723
    • Aizatulin, M.1    Gordon, A.D.2    Jürjens, J.3
  • 3
    • 57849126802 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • Bhargavan, K., Fournet, C., Gordon, A., Tse, S.: Verified interoperable implementations of security protocols. ACM TOPLAS 31(1) (2008)
    • (2008) ACM TOPLAS , vol.31 , Issue.1
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3    Tse, S.4
  • 4
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Transactions on Dependable and Secure Computing 5(4), 193-207 (2008)
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 5
    • 84866904130 scopus 로고    scopus 로고
    • Automatically verified mechanized proof of one-encryption key exchange
    • IEEE, Los Alamitos
    • Blanchet, B.: Automatically verified mechanized proof of one-encryption key exchange. In: CSF 2012, pp. 325-339. IEEE, Los Alamitos (2012)
    • (2012) CSF 2012 , pp. 325-339
    • Blanchet, B.1
  • 7
    • 84869450610 scopus 로고    scopus 로고
    • From computationally-proved protocol specifications to implementations
    • IEEE, Los Alamitos
    • Cadé, D., Blanchet, B.: From computationally-proved protocol specifications to implementations. In: ARES 2012, pp. 65-74. IEEE, Los Alamitos (2012)
    • (2012) ARES 2012 , pp. 65-74
    • Cadé, D.1    Blanchet, B.2
  • 8
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • IEEE, Los Alamitos
    • Chaki, S., Datta, A.: ASPIER: An automated framework for verifying security protocol implementations. In: CSF 2009, pp. 172-185. IEEE, Los Alamitos (2009)
    • (2009) CSF 2009 , pp. 172-185
    • Chaki, S.1    Datta, A.2
  • 9
    • 80052648343 scopus 로고    scopus 로고
    • Guiding a general-purpose C verifier to prove cryptographic protocols
    • IEEE, Los Alamitos
    • Dupressoir, F., Gordon, A.D., Jürjens, J., Naumann, D.A.: Guiding a general-purpose C verifier to prove cryptographic protocols. In: CSF 2011, pp. 3-17. IEEE, Los Alamitos (2011)
    • (2011) CSF 2011 , pp. 3-17
    • Dupressoir, F.1    Gordon, A.D.2    Jürjens, J.3    Naumann, D.A.4
  • 10
    • 80755169483 scopus 로고    scopus 로고
    • Modular code-based cryptographic verification
    • ACM, New York
    • Fournet, C., Kohlweiss, M., Strub, P.Y.: Modular code-based cryptographic verification. In: CCS 2011, pp. 341-350. ACM, New York (2011)
    • (2011) CCS 2011 , pp. 341-350
    • Fournet, C.1    Kohlweiss, M.2    Strub, P.Y.3
  • 11
    • 84874399729 scopus 로고    scopus 로고
    • http://msr-inria.inria.fr/projects/sec/fs2cv/
  • 12
    • 84859368981 scopus 로고    scopus 로고
    • χ-spaces: Programming security protocols
    • Milicia, G.: χ-spaces: Programming security protocols. In: NWPT 2002 (2002)
    • (2002) NWPT 2002
    • Milicia, G.1
  • 13
    • 47249096280 scopus 로고    scopus 로고
    • A Sound Semantics for OCamllight
    • Drossopoulou, S. (ed.) ESOP 2008. Springer, Heidelberg
    • Owens, S.: A Sound Semantics for OCamllight . In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 1-15. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4960 , pp. 1-15
    • Owens, S.1
  • 14
    • 77949567843 scopus 로고    scopus 로고
    • Provably correct Java implementations of spi calculus security protocols specifications
    • Pironti, A., Sisto, R.: Provably correct Java implementations of spi calculus security protocols specifications. Computers and Security 29(3), 302-314 (2010)
    • (2010) Computers and Security , vol.29 , Issue.3 , pp. 302-314
    • Pironti, A.1    Sisto, R.2
  • 15
    • 80054054746 scopus 로고    scopus 로고
    • Secure distributed programming with value-dependent types
    • ACM, New York
    • Swamy, N., Chen, J., Fournet, C., Strub, P.Y., Bharagavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: ICFP 2011, pp. 266-278. ACM, New York (2011)
    • (2011) ICFP 2011 , pp. 266-278
    • Swamy, N.1    Chen, J.2    Fournet, C.3    Strub, P.Y.4    Bharagavan, K.5    Yang, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.