메뉴 건너뛰기




Volumn 2421 LNCS, Issue , 2002, Pages 499-514

On name generation and set-based analysis in the Dolev-Yao model

Author keywords

Cryptographic protocols; Name generation; Set constraints; Verification

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; VERIFICATION;

EID: 84874678490     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45694-5_33     Document Type: Conference Paper
Times cited : (43)

References (19)
  • 1
    • 84874721980 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • (to appear). Also RR 4147, INRIA
    • R. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science (to appear). Also RR 4147, INRIA.
    • Theoretical Computer Science
    • Amadio, R.1    Lugiez, D.2    Vanackere, V.3
  • 2
    • 84874736696 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the dolev-yao model
    • January
    • R. Amadio, W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. RR-INRIA 4379, January 2002.
    • (2002) RR-INRIA 4379
    • Amadio, R.1    Charatonik, W.2
  • 3
    • 84874743229 scopus 로고    scopus 로고
    • On the decidability of fragments of the asynchronous π-calculus
    • (to appear). Also RR-INRIA 4241
    • R. Amadio, C. Meyssonnier. On the decidability of fragments of the asynchronous π-calculus. Journal of Nordic Computing (to appear). Also RR-INRIA 4241.
    • Journal of Nordic Computing
    • Amadio, R.1    Meyssonnier, C.2
  • 6
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • Springer Lecture Notes in Comp. Sci. 2076
    • H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints, and ping-pong protocols. In Proc. ICALP, Springer Lecture Notes in Comp. Sci. 2076, 2001.
    • (2001) Proc. ICALP
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 10
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198-208, 1983.
    • (1983) IEEE Trans. on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • Springer Lecture Notes in Comp. Sci. 1831
    • T. Genet and F. Klay. Rewriting for cryptographic protocol verification. In Proc. CADE, Springer Lecture Notes in Comp. Sci. 1831, 2000.
    • (2000) Proc. CADE
    • Genet, T.1    Klay, F.2
  • 12
    • 0011121266 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification
    • Springer-Verlag
    • J. Goubault. A method for automatic cryptographic protocol verification. In Proc. FMPPTA, Springer-Verlag, 2000.
    • (2000) Proc. FMPPTA
    • Goubault, J.1
  • 13
    • 84874702382 scopus 로고
    • A decision procedure for a class of set constraints (extended abstract)
    • N. Heintze and J. Jaffar. A decision procedure for a class of set constraints (extended abstract). In Proc. 5th IEEE LICS, 1990.
    • (1990) Proc. 5th IEEE LICS
    • Heintze, N.1    Jaffar, J.2
  • 15
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Springer Lect. Notes in Comp. Sci.
    • D. Monniaux. Abstracting cryptographic protocols with tree automata. In Proc. Static Analysis Symposium, Springer Lect. Notes in Comp. Sci., 1999.
    • (1999) Proc. Static Analysis Symposium
    • Monniaux, D.1
  • 16
    • 84874714003 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is NP-complete
    • March
    • M. Rusinowitch and M. Turuani Protocol insecurity with finite number of sessions is NP-complete. RR INRIA 4134, March 2001.
    • (2001) RR INRIA 4134
    • Rusinowitch, M.1    Turuani, M.2
  • 17
    • 0004021264 scopus 로고    scopus 로고
    • A bound on attacks on authentication protocols
    • CS Dept., july
    • S. Stoller. A bound on attacks on authentication protocols. TR 526, Indiana University, CS Dept., july 1999.
    • (1999) TR 526, Indiana University
    • Stoller, S.1
  • 19
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • Springer Lect. Notes in Comp. Sci. (LNAI) 1632
    • C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In Proc. CADE 99. Springer Lect. Notes in Comp. Sci. (LNAI) 1632, 1999.
    • (1999) Proc. CADE 99
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.