메뉴 건너뛰기




Volumn 2372 LNCS, Issue , 2002, Pages 76-90

Proof theory, transformations, and logic programming for debugging security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; COMPUTER CIRCUITS; DIFFERENTIATION (CALCULUS); LOGIC PROGRAMMING; SEMANTICS; FORMAL LOGIC; PROLOG (PROGRAMMING LANGUAGE); RECONFIGURABLE HARDWARE;

EID: 84879482667     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45607-4_5     Document Type: Conference Paper
Times cited : (5)

References (30)
  • 1
    • 0036040302 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. In Proc. POPL 2002, pages 33-44, 2002
    • (2002) Proc. POPL 2002 , pp. 33-44
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • D. Basin. Lazy infinite-state analysis of security protocols. Secure Networking-CQRE [Secure] '99, LNCS 1740, pages 30-42, 1999
    • (1999) Secure Networking-CQRE [Secure] '99, LNCS , vol.1740 , pp. 30-42
    • Basin, D.1
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. CSFW'01, 2001
    • (2001) Proc. CSFW'01
    • Blanchet, B.1
  • 8
    • 0033698744 scopus 로고    scopus 로고
    • Relating strands and multiset rewriting for security protocol analysis
    • I. Cervesato, N. Durgin, J. Mitchell. Lincoln, and A. Scedrov. Relating strands and multiset rewriting for security protocol analysis. In Proc. CSFW '00, pages 35-51, 2000
    • (2000) Proc. CSFW '00 , pp. 35-51
    • Cervesato, I.1    Durgin, N.2    Lincoln, J.M.3    Scedrov, A.4
  • 11
    • 84879477746 scopus 로고    scopus 로고
    • Towards efficient automated verification of security protocols
    • Y.Chevalier and L.Vigneron. Towards efficient automated verification of security protocols. In Proc. VERIF '01, 2001
    • (2001) Proc. VERIF '01
    • Chevalier, Y.1    Vigneron, L.2
  • 12
    • 23044522745 scopus 로고    scopus 로고
    • Specifying and debugging security protocols via hereditary harrop formulas and lambda prolog
    • G. Delzanno. Specifying and debugging security protocols via hereditary harrop formulas and lambda prolog. In Proc. FLOPS '01, pages 123-137, 2001
    • (2001) Proc. FLOPS '01 , pp. 123-137
    • Delzanno, G.1
  • 13
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198-208, 1983
    • (1983) IEEE Trans. on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 15
    • 30144439153 scopus 로고    scopus 로고
    • Efficient infinite-state analysis of security protocols
    • A. Huima. Efficient infinite-state analysis of security protocols. In Proc. FMSP '99 (FLOC '99), 1999
    • (1999) Proc. FMSP '99 (FLOC '99)
    • Huima, A.1
  • 17
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using fdr
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software Concepts and Tools, (17):93-102, 1996
    • (1996) Software Concepts and Tools , Issue.17 , pp. 93-102
    • Lowe, G.1
  • 18
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc.CSFW '97, pages 18-30, 1997
    • (1997) Proc.CSFW '97 , pp. 18-30
    • Lowe, G.1
  • 19
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe. Towards a completeness result for model checking of security protocols. J. of Computer Security, 7(2-3):89-146, 1998
    • (1998) J. of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 20
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • C. Meadows. Formal verification of cryptographic protocols: A survey. In Proc. ASIACRYPT '94, pages 133-150, 1995
    • (1995) Proc. ASIACRYPT '94 , pp. 133-150
    • Meadows, C.1
  • 21
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. J. of Logic Programming, 26(2):113-131, 1996
    • (1996) J. of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978
    • (1978) Comm. of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 27
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Computer Security, 6:85-128, 1998
    • (1998) J. of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 30
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions is np-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions is np-complete. In Proc. CSFW '01, 2001.
    • (2001) Proc. CSFW '01
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.