메뉴 건너뛰기




Volumn 1644 LNCS, Issue , 1999, Pages 25-39

Proof techniques for cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; LOGIC PROGRAMMING;

EID: 84887442584     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48523-6_3     Document Type: Conference Paper
Times cited : (3)

References (45)
  • 1
    • 0000421604 scopus 로고
    • Logic programming with focusing proofs in linear logic
    • J.-M. Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3), 1992.
    • (1992) Journal of Logic and Computation , vol.2 , Issue.3
    • Andreoli, J.-M.1
  • 10
    • 14044264137 scopus 로고    scopus 로고
    • The authentication protocol
    • Defence Research Agency, Malvern, UK
    • J. A. Bull and D. J. Otway. The authentication protocol. Technical Report CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
    • (1997) Technical Report CSM/436-04/03
    • Bull, J.A.1    Otway, D.J.2
  • 14
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 16
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 19
    • 0004504295 scopus 로고
    • A uniform proof-theoretic investigation of linear logic programming
    • April
    • J. Harland and D. Pym. A uniform proof-theoretic investigation of linear logic programming. Journal of Logic and Computation, 4(2), April 1994. 175-207.
    • (1994) Journal of Logic and Computation , vol.4 , Issue.2 , pp. 175-207
    • Harland, J.1    Pym, D.2
  • 21
    • 43949161369 scopus 로고
    • Logic programming in a fragment of intuitionistic linear logic
    • May
    • J. S. Hodas and D. Miller. Logic programming in a fragment of intuitionistic linear logic. Journal of Information and Computation, 110(2):327-365, May 1994.
    • (1994) Journal of Information and Computation , vol.110 , Issue.2 , pp. 327-365
    • Hodas, J.S.1    Miller, D.2
  • 22
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7:79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 24
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public key protocol using csp and fdr
    • T. Margaria and B. Stefien, editors, volume 1055 of Lecture Notes in Computer Science, SpringerVerlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public key protocol using CSP and FDR. In T. Margaria and B. Stefien, editors, Tools and Algorithms for the Construction and Analysis of Systems Second International Workshop, TACAS '96, volume 1055 of Lecture Notes in Computer Science, pages 147-166. SpringerVerlag, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems Second International Workshop, TACAS '96 , pp. 147-166
    • Lowe, G.1
  • 27
    • 0022047443 scopus 로고
    • Why horn formulas matter in computer science: Initial structures and generic examples
    • J. A. Makowsky. Why Horn formulas matter in computer science: Initial structures and generic examples. Journal of Computer and System Sciences, 34:266-292, 1987.
    • (1987) Journal of Computer and System Sciences , vol.34 , pp. 266-292
    • Makowsky, J.A.1
  • 28
    • 85063324040 scopus 로고
    • Development of authentication protocols: Some misconceptions and a new approach
    • IEEE
    • W. Mao and C. Boyd. Development of authentication protocols: Some misconceptions and a new approach. In Proceedings of the Computer Security Foundations Workshop VII, pages 178-186. IEEE, 1994.
    • (1994) Proceedings of the Computer Security Foundations Workshop VII , pp. 178-186
    • Mao, W.1    Boyd, C.2
  • 29
    • 0003735470 scopus 로고    scopus 로고
    • Model checking for security protocols
    • School of Computer Science, Carnegie Mellon University, May
    • W. Marrero, E. Clarke, and S. Jha. Model checking for security protocols. Technical Report CMU-CS-97-139, School of Computer Science, Carnegie Mellon University, May 1997.
    • (1997) Technical Report CMU-CS-97-139
    • Marrero, W.1    Clarke, E.2    Jha, S.3
  • 30
    • 0030084918 scopus 로고    scopus 로고
    • The nrl protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. The Journal of Logic Programming, pages 113-131, 1996.
    • (1996) The Journal of Logic Programming , pp. 113-131
    • Meadows, C.1
  • 31
    • 84887475973 scopus 로고    scopus 로고
    • Analysis of security protocols
    • available at, July
    • J. C. Mitchell. Analysis of security protocols. Slides for a talk at CAV '98, available at http://www.stanford.edu/jcm, July 1998.
    • (1998) Slides for a Talk at CAV '98
    • Mitchell, J.C.1
  • 32
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 34
    • 17744375732 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • University of Cambridge
    • L. C. Paulson. Proving properties of security protocols by induction. Technical Report TR-409, Computer Laboratory, University of Cambridge, 1996.
    • (1996) Technical Report TR-409, Computer Laboratory
    • Paulson, L.C.1
  • 42
    • 0028459868 scopus 로고
    • Proof strategies in linear logic
    • T. Tammet. Proof strategies in linear logic. Journal of Automated Reasoning, 12:273-304, 1994.
    • (1994) Journal of Automated Reasoning , vol.12 , pp. 273-304
    • Tammet, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.