메뉴 건너뛰기




Volumn 22, Issue 5, 2010, Pages 585-609

A game-theoretic framework for specification and verification of cryptographic protocols

Author keywords

Formal verification; Game semantics; Model checking; Security protocols

Indexed keywords

MODEL CHECKING; NETWORK SECURITY; TREES (MATHEMATICS);

EID: 84890871230     PISSN: 09345043     EISSN: 1433299X     Source Type: Journal    
DOI: 10.1007/s00165-009-0129-4     Document Type: Article
Times cited : (1)

References (31)
  • 2
    • 0001794268 scopus 로고    scopus 로고
    • Semantics of interaction: An introduction to game semantics
    • In: Dybjer P, Pitts A (eds), Isaac Newton Institute. Cambridge University Press, Cambridge
    • Abramsky S (1997) Semantics of interaction: an introduction to game semantics. In: Dybjer P, Pitts A (eds) Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute. Cambridge University Press, Cambridge
    • (1997) Proceedings of the 1996 CLiCS Summer School
    • Abramsky, S.1
  • 4
    • 0037421015 scopus 로고    scopus 로고
    • A new logic for electronic commerce protocols
    • Adi K, Debbabi M, Mejri M (2003) A new logic for electronic commerce protocols. Theor Comput Sci 291(3):223-283
    • (2003) Theor Comput Sci , vol.291 , Issue.3 , pp. 223-283
    • Adi, K.1    Debbabi, M.2    Mejri, M.3
  • 5
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Abadi M, Fournet C (2001) Mobile values, new names, and secure communication. In: POPL, pp 104-115
    • (2001) POPL , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 9
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundeness of formal encryption)
    • Abadi M, Rogaway P (2002) Reconciling two views of cryptography (The computational soundeness of formal encryption). J Cryptol 15(2):103-127
    • (2002) J Cryptol , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 10
    • 26844508455 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • IEEE Computer Society, New York
    • Blanchet B, Abadi M, Fournet C (2005) Automated verification of selected equivalences for security protocols. In: LICS, pp 331-340. IEEE Computer Society, New York
    • (2005) LICS , pp. 331-340
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 13
    • 0001618306 scopus 로고
    • A game semantics for linear logic
    • Blass A (1992) A game semantics for linear logic. Ann Pure Appl Logic 56:183-220
    • (1992) Ann Pure Appl Logic , vol.56 , pp. 183-220
    • Blass, A.1
  • 15
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • Clarke E, Jha S, MarreroW (1998) Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: International Conference on Programming Concepts and Methods, pp 87-106
    • (1998) International Conference on Programming Concepts and Methods , pp. 87-106
    • Clarke, E.1    Jha, S.2    Marrero, W.3
  • 16
    • 33750194652 scopus 로고    scopus 로고
    • Formal analysis of multiparty contract signing
    • Chadha R, kremer S, Scedrov A (2006) Formal analysis of multiparty contract signing. J Autom Reason 36:39-83
    • (2006) J Autom Reason , vol.36 , pp. 39-83
    • Chadha, R.1    Kremer, S.2    Scedrov, A.3
  • 17
    • 0025494721 scopus 로고
    • Tableau-based model checking in the propositional mu-calculus
    • Cleaveland R (1990) Tableau-based model checking in the propositional mu-calculus. Acta Inform 27(8):725-748
    • (1990) Acta Inform , vol.27 , Issue.8 , pp. 725-748
    • Cleaveland, R.1
  • 19
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198-208
    • (1983) IEEE Trans Inform Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 20
    • 0034672932 scopus 로고    scopus 로고
    • On full abstraction for PCF: I, II, III
    • Hyland JME, Ong C-HL (2000) On full abstraction for PCF: I, II, III. Info Comp 163:285-408
    • (2000) Info Comp , vol.163 , pp. 285-408
    • Hyland, J.M.E.1    Ong, C.-H.L.2
  • 21
    • 46749146096 scopus 로고    scopus 로고
    • Games in the semantics of programming languages
    • October/November 2002
    • Jurjens J (2002) Games in the semantics of programming languages. Synthese (Elsevier) 133(1-2), October/November 2002
    • (2002) Synthese (Elsevier) , vol.133 , Issue.1-2
    • Jurjens, J.1
  • 23
    • 84937345304 scopus 로고    scopus 로고
    • Basic objectives of dialogue logic in historical perspective
    • April/May
    • Lorenz K (2001) Basic objectives of dialogue logic in historical perspective. Synthese (Elsevier), 127(1-2), April/May
    • (2001) Synthese (Elsevier) , vol.127 , Issue.1-2
    • Lorenz, K.1
  • 24
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software-concepts and tools 17(3):93-102
    • (1996) Software-concepts and Tools , vol.17 , Issue.3 , pp. 93-102
    • Lowe, G.1
  • 25
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specification
    • IEEE Computer Society, New York
    • Lowe G (1997) A hierarchy of authentication specification. In: CSFW, pp 31-44. IEEE Computer Society, New York
    • (1997) CSFW , pp. 31-44
    • Lowe, G.1
  • 26
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R, SchroederM(1978) Using encryption for authentication in large networks of computers. Commun ACM21(12)
    • (1978) Commun ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 27
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • 1998
    • Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comp Secur 85-128 (1998)
    • (1998) J Comp Secur , pp. 85-128
    • Paulson, L.C.1
  • 30
    • 0141631479 scopus 로고    scopus 로고
    • Computable functions and semicomputable sets on many-sorted algebras
    • In: Abramsky S,Gabbay D, Maibaum T, (eds). Oxford University Press, Oxford
    • Tucker JV, Zucker JI (2000) Computable functions and semicomputable sets on many-sorted algebras. In: Abramsky S,Gabbay D, Maibaum T, (eds) Handbook of logic in computer science, vol 5, pp 317-523. Oxford University Press, Oxford
    • (2000) Handbook of Logic in Computer Science , vol.5 , pp. 317-523
    • Tucker, J.V.1    Zucker, J.I.2
  • 31
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • Woo TYC, Lam SS (1994) A lesson on authentication protocol design. Oper Syst Rev 24-37
    • (1994) Oper Syst Rev , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.