메뉴 건너뛰기




Volumn 8044 LNCS, Issue , 2013, Pages 696-701

The TAMARIN prover for the symbolic analysis of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARY MODELS; EQUATIONAL REASONING; ITS APPLICATIONS; SECURITY PROTOCOLS; SYMBOLIC ANALYSIS;

EID: 84881193419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-39799-8_48     Document Type: Conference Paper
Times cited : (526)

References (15)
  • 1
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, falsification, and analysis of security protocols
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 414-418
    • Cremers, C.J.F.1
  • 2
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 3
    • 84866938883 scopus 로고    scopus 로고
    • Automated analysis of Diffie-Hellman protocols and advanced security properties
    • IEEE
    • Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: Proc. CSF. IEEE (2012)
    • (2012) Proc. CSF
    • Schmidt, B.1    Meier, S.2    Cremers, C.3    Basin, D.4
  • 6
    • 24944569389 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
    • Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294-307. Springer, Heidelberg (2005) (Pubitemid 41313364)
    • (2005) Lecture Notes in Computer Science , vol.3467 , pp. 294-307
    • Comon-Lundh, H.1    Delaune, S.2
  • 7
    • 84881181200 scopus 로고    scopus 로고
    • http://www.infsec.ethz.ch/research/software/tamarin
  • 8
    • 80052654636 scopus 로고    scopus 로고
    • Statverif: Verification of stateful processes
    • IEEE
    • Arapinis, M., Ritter, E., Ryan, M.: Statverif: Verification of stateful processes. In: Proc. CSF. IEEE (2011)
    • (2011) Proc. CSF
    • Arapinis, M.1    Ritter, E.2    Ryan, M.3
  • 9
    • 78650030226 scopus 로고    scopus 로고
    • Abstraction by set-membership: Verifying security protocols and web services with databases
    • ACM
    • Mödersheim, S.: Abstraction by set-membership: verifying security protocols and web services with databases. In: Proc. CCS, pp. 351-360. ACM (2010)
    • (2010) Proc. CCS , pp. 351-360
    • Mödersheim, S.1
  • 10
    • 80052679988 scopus 로고    scopus 로고
    • Formal analysis of protocols based on TPM state registers
    • IEEE
    • Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: Formal analysis of protocols based on TPM state registers. In: Proc. CSF, pp. 66-80. IEEE (2011)
    • (2011) Proc. CSF , pp. 66-80
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3    Steel, G.4
  • 11
    • 84881154499 scopus 로고    scopus 로고
    • YubiSecure? Formal security analysis results for the YubiKey and YubiHSM
    • Jøsang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. Springer, Heidelberg
    • Künnemann, R., Steel, G.: YubiSecure? Formal security analysis results for the YubiKey and YubiHSM. In: Jøsang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 257-272. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7783 , pp. 257-272
    • Künnemann, R.1    Steel, G.2
  • 12
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
    • Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. TCS 367, 162-202 (2006)
    • (2006) TCS , vol.367 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 13
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE
    • Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. CSFW. IEEE (2001)
    • (2001) Proc. CSFW
    • Blanchet, B.1
  • 14
    • 79956084660 scopus 로고    scopus 로고
    • Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach
    • Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. J. Autom. Reasoning 46(3-4), 325-352 (2011)
    • (2011) J. Autom. Reasoning , vol.46 , Issue.3-4 , pp. 325-352
    • Küsters, R.1    Truderung, T.2
  • 15
    • 84866948237 scopus 로고    scopus 로고
    • Symbolic analysis of cryptographic protocols containing bilinear pairings
    • IEEE
    • Pankova, A., Laud, P.: Symbolic analysis of cryptographic protocols containing bilinear pairings. In: Proc. CSF. IEEE (2012)
    • (2012) Proc. CSF
    • Pankova, A.1    Laud, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.