메뉴 건너뛰기




Volumn 2267 LNCS, Issue , 2002, Pages 21-47

Algebraic abstractions

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY;

EID: 84893138418     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45645-7_2     Document Type: Conference Paper
Times cited : (1)

References (14)
  • 4
    • 84947418221 scopus 로고    scopus 로고
    • Towards a mechanization of cryptographic protocol verification
    • Proc. 9th Int. Conf. Computer Aided Verification (CAV'97), Haifa, Israel, June 1997, Springer
    • D. Bolignano. Towards a mechanization of cryptographic protocol verification. In Proc. 9th Int. Conf. Computer Aided Verification (CAV'97), Haifa, Israel, June 1997, volume 1254 of Lecture Notes in Computer Science, pages 131-142. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1254 , pp. 131-142
    • Bolignano, D.1
  • 5
    • 19344366696 scopus 로고    scopus 로고
    • Using abstract interpretation for the safe verification of security protocols
    • MFPS XV Mathematical Foundations of Programming Semantics, Fifteenth Conference, Tulane University, New Orleans, LA, April 28-May 1, 1999, Elsevier Science
    • D. Bolignano. Using abstract interpretation for the safe verification of security protocols. In MFPS XV Mathematical Foundations of Programming Semantics, Fifteenth Conference, Tulane University, New Orleans, LA, April 28-May 1, 1999, volume 20 of Electronic Notes in Theor. Comp. Sci. Elsevier Science, 1999.
    • (1999) Electronic Notes in Theor. Comp. Sci. , vol.20
    • Bolignano, D.1
  • 8
    • 0000911801 scopus 로고
    • Abstract interpretation and application to logic programs
    • P. Cousot and R. Cousot. Abstract interpretation and application to logic programs. Journal of Logic Programming, 13(2-3):103-179, 1992.
    • (1992) Journal of Logic Programming , vol.13 , Issue.2-3 , pp. 103-179
    • Cousot, P.1    Cousot, R.2
  • 11
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification
    • extended abstract Proc. 15th IPDPS 2000 Workshops, Cancun, Mexico, May 2000, Springer
    • J. Goubault-Larrecq. A method for automatic cryptographic protocol verification (extended abstract). In Proc. 15th IPDPS 2000 Workshops, Cancun, Mexico, May 2000, volume 1800 of Lecture Notes in Computer Science, pages 977-984. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1800 , pp. 977-984
    • Goubault-Larrecq, J.1
  • 12
    • 84957656483 scopus 로고    scopus 로고
    • Rules for abstraction
    • R. K. Shyamasundar and K. Ueda, editors, Advances in Computing Science (ASIAN'97), Berlin, Germany, Springer
    • S. Merz. Rules for abstraction. In R. K. Shyamasundar and K. Ueda, editors, Advances in Computing Science (ASIAN'97), volume 1345 of LNCS, pages 32-45, Berlin, Germany, 1997. Springer.
    • (1997) LNCS , vol.1345 , pp. 32-45
    • Merz, S.1
  • 13
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6:85-128, 1998.
    • (1998) J. Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 14
    • 84893073853 scopus 로고    scopus 로고
    • Towards heterogeneous specifications
    • Proc. Workshop on Frontiers of Combining Systems FroCoS'98, Amsterdam, October 1998, Kluwer Academic Publishers, To appear
    • A. Tarlecki. Towards heterogeneous specifications. In Proc. Workshop on Frontiers of Combining Systems FroCoS'98, Amsterdam, October 1998, Applied Logic Series. Kluwer Academic Publishers, 1998. (To appear).
    • (1998) Applied Logic Series
    • Tarlecki, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.