메뉴 건너뛰기




Volumn 4, Issue 1, 2013, Pages 4-31

From computationally-proved protocol specifications to implementations and application to SSH

Author keywords

Compiler; Computational model; Implementation; Security protocols; SSH; Verification

Indexed keywords


EID: 84886918886     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (37)
  • 2
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • October-December
    • B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 193-207, October-December 2008.
    • (2008) IEEE Transactions On Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 3
    • 35048865382 scopus 로고    scopus 로고
    • Computationally sound mechanized proofs of correspondence assertions
    • Venice, Italy. IEEE, July
    • B. Blanchet, Computationally sound mechanized proofs of correspondence assertions, in Proc. of the 20th IEEE Computer Security Symposium (CSF'07), Venice, Italy. IEEE, July 2007, pp. 97-111.
    • (2007) Proc. of the 20th IEEE Computer Security Symposium (CSF'07) , pp. 97-111
    • Blanchet, B.1
  • 4
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Santa Barbara, California, USA, LNCS, Springer-Verlag, August
    • B. Blanchet and D. Pointcheval, Automated security proofs with sequences of games, in Proc. of the 26th Annual International Cryptology Conference (CRYPTO'06), Santa Barbara, California, USA, LNCS, vol. 4117. Springer-Verlag, August 2006, pp. 537-554.
    • (2006) Proc. of the 26th Annual International Cryptology Conference (CRYPTO'06) , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 5
    • 84874422917 scopus 로고    scopus 로고
    • Proved generation of implementations from computationally secure protocol specifications
    • Rome, Italy, LNCS, Springer-Verlag, March
    • D. Cadé and B. Blanchet, Proved generation of implementations from computationally secure protocol specifications, in Proc. of the 2nd Conference on Principles of Security and Trust (POST'13), Rome, Italy, LNCS, vol. 7796. Springer-Verlag, March 2013, pp. 63-82.
    • (2013) Proc. of the 2nd Conference On Principles of Security and Trust (POST'13) , vol.7796 , pp. 63-82
    • Cadé, D.1    Blanchet, B.2
  • 6
    • 84958777572 scopus 로고    scopus 로고
    • AGVI-Automatic Generation, Verification, and Implementation of security protocols
    • Paris, France, LNCS, vol. 2102. Springer-Verlag, July
    • D. Song, A. Perrig, and D. Phan, AGVI-Automatic Generation, Verification, and Implementation of security protocols, in Proc. of the 13th Conference on Computer Aided Verification (CAV'01), Paris, France, LNCS, vol. 2102. Springer-Verlag, July 2001, pp. 241-245.
    • (2001) Proc. of the 13th Conference On Computer Aided Verification (CAV'01) , pp. 241-245
    • Song, D.1    Perrig, A.2    Phan, D.3
  • 9
    • 77949567843 scopus 로고    scopus 로고
    • Provably correct Java implementations of spi calculus security protocols specifications
    • May
    • A. Pironti and R. Sisto, Provably correct Java implementations of spi calculus security protocols specifications, Computers and Security, vol. 29, no. 3, pp. 302-314, May 2010.
    • (2010) Computers and Security , vol.29 , Issue.3 , pp. 302-314
    • Pironti, A.1    Sisto, R.2
  • 10
    • 48049092340 scopus 로고    scopus 로고
    • An experiment in interoperable cryptographic protocol implementation using automatic code generation
    • Aveiro, Portugal. IEEE, July
    • A. Pironti and R. Sisto, An experiment in interoperable cryptographic protocol implementation using automatic code generation, in Proc. of the IEEE Symposium on Computers and Communications (ISCC'07), Aveiro, Portugal. IEEE, July 2007, pp. 839-844.
    • (2007) Proc. of the IEEE Symposium On Computers and Communications (ISCC'07) , pp. 839-844
    • Pironti, A.1    Sisto, R.2
  • 15
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • Port Jefferson, New York, USA. IEEE, July
    • S. Chaki and A. Datta, ASPIER: An automated framework for verifying security protocol implementations, in Proc. of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), Port Jefferson, New York, USA. IEEE, July 2009, pp. 172-185.
    • (2009) Proc. of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) , pp. 172-185
    • Chaki, S.1    Datta, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.