메뉴 건너뛰기




Volumn 19, Issue 4, 2009, Pages 403-429

LTL model checking for security protocols

Author keywords

Abstract Communication Channels; Asw; Bounded Model Checking; Ltl; Multi Set Rewriting; Sat Based Model Checking; Security Protocols

Indexed keywords


EID: 84887471494     PISSN: 11663081     EISSN: 19585780     Source Type: Journal    
DOI: 10.3166/jancl.19.403-429     Document Type: Article
Times cited : (31)

References (36)
  • 1
    • 84982909952 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • Abadi M., Fournet C., Gonthier G., "Secure Implementation of Channel Abstractions", LICS, pp. 105-116, 1998
    • (1998) LICS , pp. 105-116
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 4
    • 84954313527 scopus 로고    scopus 로고
    • Automatic SAT-Compilation of protocol insecurity problems via reduction to planning
    • D. Peled, M. Vardi (eds) Springer-Verlag Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002. Available at
    • Armando A., Compagna L., "Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning", in D. Peled, M. Vardi (eds), Proceedings of 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), LNCS 2529, Springer-Verlag, pp. 210-225, 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002. Available at www. avispa-project.org
    • (2002) Proceedings of 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE) LNCS 2529 , pp. 210-225
    • Armando, A.1    Compagna, L.2
  • 6
    • 38149132464 scopus 로고    scopus 로고
    • SAT-based model-checking for security protocols analysis
    • to appear on Available at
    • Armando A., Compagna L., "SAT-based Model-Checking for Security Protocols Analysis", International Journal of Information Security (to appear on), 2007. Available at http://www.ai-lab.it/compagna/papers/IJIS-2006/ paper.pdf
    • (2007) International Journal of Information Security
    • Armando, A.1    Compagna, L.2
  • 7
    • 35248876774 scopus 로고    scopus 로고
    • SAT-based model-checking of security protocols using planning graph analysis
    • K. Araki, S. Gnesi, D. Mandrioli (eds) LNCS 2805, Springer-Verlag Available at
    • Armando A., Compagna L., Ganty P., "SAT-based Model-Checking of Security Protocols using Planning Graph Analysis", in K. Araki, S. Gnesi, D. Mandrioli (eds), Proceedings of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, Springer- Verlag, pp. 875-893, 2003. Available at www.avispa-project.org
    • (2003) Proceedings of the 12th International Symposium of Formal Methods Europe (FME) , pp. 875-893
    • Armando, A.1    Compagna, L.2    Ganty, P.3
  • 9
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • R. Baumgart (ed) LNCS 1740, Springer-Verlag
    • Basin D., "Lazy Infinite-State Analysis of Security Protocols", in R. Baumgart (ed.), Secure Networking - CQRE (Secure)?99, LNCS 1740, Springer-Verlag, pp. 30-42, 1999
    • (1999) Secure Networking-CQRE (Secure)?99 , pp. 30-42
    • Basin, D.1
  • 10
    • 33646262130 scopus 로고    scopus 로고
    • Algebraic intruder deductions"
    • G. Sutcliffe, A. Voronkov (eds) Springer
    • Basin D., Mödersheim S., Viganò L., "Algebraic Intruder Deductions", in G. Sutcliffe, A. Voronkov (eds), Proceedings of LPAR?05, LNAI 3835, Springer, pp. 549-564, 2005
    • (2005) Proceedings of LPAR?05, LNAI , vol.3835 , pp. 549-564
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 13
    • 34547372939 scopus 로고    scopus 로고
    • An intruder model for verifying liveness in security protocols
    • M. Winslett, A. D. Gordon, D. Sands (eds)
    • Cederquist J., Dashti M. T., "An intruder model for verifying liveness in security protocols", in M. Winslett, A. D. Gordon, D. Sands (eds), FMSE, ACM, pp. 23-32, 2006
    • (2006) FMSE ACM , pp. 23-32
    • Cederquist, J.1    Dashti, M.T.2
  • 25
    • 26844469379 scopus 로고    scopus 로고
    • A formalization of off-line guessing for security protocol analysis
    • F. Baader, A. Voronkov (eds)
    • Hankes Drielsma P., Mödersheim S., Viganò L., "A Formalization of Off-Line Guessing for Security Protocol Analysis", in F. Baader, A. Voronkov (eds), Proceedings of LPAR?04, vol. 3452 of LNAI, Springer, pp. 363-379, 2005
    • (2005) Proceedings of LPAR?04 of LNAI Springer , vol.3452 , pp. 363-379
    • Hankes Drielsma, P.1    Mödersheim, S.2    Viganò, L.3
  • 26
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • M. Parigot, A. Voronkov (eds) Springer-Verlag
    • Jacquemard F., Rusinowitch M., Vigneron L., "Compiling and Verifying Security Protocols", in M. Parigot, A. Voronkov (eds), Proceedings of LPAR 2000, LNCS 1955, Springer-Verlag, pp. 131-160, 2000
    • (2000) Proceedings of LPAR 2000, LNCS 1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 29
    • 70449412265 scopus 로고    scopus 로고
    • Automatic methods for analyzing non-repudiation protocols with an active intruder
    • P. Degano, J. Guttman, F. Martinelli (eds) To appear as LNCS
    • Klay F., Vigneron L., "Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder", in P. Degano, J. Guttman, F. Martinelli (eds), 5th International Workshop on Formal Aspects in Security and Trust (FAST), pp. 165-180, 2008. To appear as LNCS
    • (2008) 5th International Workshop on Formal Aspects in Security and Trust (FAST) , pp. 165-180
    • Klay, F.1    Vigneron, L.2
  • 30
    • 4944228536 scopus 로고    scopus 로고
    • Analysing protocols subject to guessing attacks
    • J. Guttman (ed) Portland, Oregon, USA January
    • Lowe G., "Analysing protocols subject to guessing attacks", in J. Guttman (ed.), Workshop on Issues in the Theory of Security (WITS?02), Portland, Oregon, USA, January, 2002
    • (2002) Workshop on Issues in the Theory of Security (WITS?02)
    • Lowe, G.1
  • 31
    • 0030232808 scopus 로고    scopus 로고
    • A calculus for security bootstrapping in distributed systems
    • Maurer U. M., Schmid P. E., "A Calculus for Security Bootstrapping in Distributed Systems", Journal of Computer Security, vol. 4, num. 1, pp. 55-80, 1996
    • (1996) Journal of Computer Security , vol.4 , Issue.1 , pp. 55-80
    • Maurer, U.M.1    Schmid, P.E.2
  • 32
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • See
    • Meadows C., "The NRL Protocol Analyzer: An Overview", Journal of Logic Programming, vol. 26, num. 2, pp. 113-131, 1996. See http://chacs.nrl.navy.mil/projects/crypto.html
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 35
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • IEEE Computer Society Press June
    • Raskin J., Kremer S., "Game Analysis of Abuse-free Contract Signing", 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, pp. 206-220, June, 2002
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 206-220
    • Raskin, J.1    Kremer, S.2
  • 36
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Shmatikov V., Mitchell J. C., "Finite-state analysis of two contract signing protocols", Theoretical Computer Science, vol. 283, num. 2, pp. 419-450, 2002
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.