메뉴 건너뛰기




Volumn 1877 LNCS, Issue , 2000, Pages 380-394

On the reachability problem in cryptographic protocols

Author keywords

Cryptographic protocols; Symbolic computation; Verification

Indexed keywords

COMPUTATION THEORY; VERIFICATION;

EID: 84885216561     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44618-4_28     Document Type: Conference Paper
Times cited : (85)

References (19)
  • 2
    • 84958762859 scopus 로고    scopus 로고
    • The game of the name in cryptographic tables
    • R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Proc. ASIAN99, SLNCS 1742, pages 15-26, 1999.
    • (1999) Proc. ASIAN99, SLNCS 1742 , pp. 15-26
    • Amadio, R.1    Prasad, S.2
  • 8
    • 0003257683 scopus 로고    scopus 로고
    • Usingstate space exploration and a natural deduction style message derivation engine to verify security protocols
    • E. Clarke, S. Jha, and W. Marrero. Usingstate space exploration and a natural deduction style message derivation engine to verify security protocols. In Proc. IFIP Conf. on Progr. Concepts and Methods (PROCOMET), 1998.
    • (1998) Proc. IFIP Conf. on Progr. Concepts and Methods (PROCOMET)
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 10
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2): 198-208, 1983.
    • (1983) IEEE Trans. on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 30144439153 scopus 로고    scopus 로고
    • Efficient infinite-state analysis of security protocols
    • FLOC Workshop, Trento
    • A. Huima. Efficient infinite-state analysis of security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.
    • (1999) Proc. Formal Methods and Security Protocols
    • Huima, A.1
  • 12
    • 0003130993 scopus 로고    scopus 로고
    • Breakingand fixingthe needham-schroeder public-key protocol using FDR
    • SLNCS
    • G. Lowe. Breakingand fixingthe Needham-Schroeder public-key protocol using FDR. In Proc. TACAS, SLNCS, 1996.
    • (1996) Proc. TACAS
    • Lowe, G.1
  • 19
    • 0001592091 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In Proc. CADE 99. SLNCS 1632, 1999.
    • (1999) Proc. CADE 99. SLNCS 1632
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.