메뉴 건너뛰기




Volumn 177, Issue , 2005, Pages 34-53

Generating network security protocol implementations from formal specifications

Author keywords

Code generation; Formal methods; Java; Process algebra; Prolog; Security; Spi calculus

Indexed keywords

CALCULATIONS; CODES (SYMBOLS); CRYPTOGRAPHY; FORMAL METHODS; FORMAL SPECIFICATION; NETWORK COMPONENTS; NETWORK PROTOCOLS; SPECIFICATIONS;

EID: 84900395207     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (9)

References (25)
  • 2
    • 24344461667 scopus 로고    scopus 로고
    • A programmer friendly modular definition of the semantics of java
    • In J. Alves-Foss, editor, Springer-Verlag, [BS99]
    • [BS99] E. Borger and W. Schulte. A programmer friendly modular definition of the semantics of java. In J. Alves-Foss, editor, Forma! Syntax and Semantics of Java, volume 1523 of Led. Notes in Comp. Sci., pages 353-404. Springer-Verlag, 1999.
    • (1999) Forma! Syntax and Semantics of Java, volume 1523 of Led. Notes in Comp. Sci , pp. 353-404
    • Borger, E.1    Schulte, W.2
  • 8
    • 14844343148 scopus 로고    scopus 로고
    • Design of a CIL connector to Maude
    • In N. Hcintze H. Vcith and E. Clarke, editors, Carnegie Mellon University, July [DenOO]
    • [DenOO] G. Denker. Design of a CIL connector to Maude. In N. Hcintze H. Vcith and E. Clarke, editors. Workshop on Format Methods and Comuter Security. Carnegie Mellon University, July 2000.
    • (2000) Workshop on Format Methods and Comuter Security
    • Denker, G.1
  • 14
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • In Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society, [LGY90]
    • [LGY90] R. Needham L. Gong and R. Yahalom. Reasoning about belief in cryptographic protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Needham, L.1    Gong, R.2    Yahalom, R.3
  • 15
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • [Low95]
    • [Low95] G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • In, Springer-Verlag. Berlin Germany, [Low96]
    • [Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055. pages 147-166. Springer-Verlag. Berlin Germany, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 0348151887 scopus 로고    scopus 로고
    • A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989
    • In, IEEE Computer Society Press, [MBN96]
    • [MBN96] M. Abadi M. Burrows and R. Needham. A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989. In William Stallings, Practical Cryptography for Data Internetworks. IEEE Computer Society Press, 1996.
    • (1996) William Stallings, Practical Cryptography for Data Internetworks
    • Abadi, M.1    Burrows, M.2    Needham, R.3
  • 22
    • 0003754739 scopus 로고
    • SGS-THOMSON Microelectronics Limiled, [SGS95]
    • [SGS95] SGS-THOMSON Microelectronics Limiled. Occam 2. 1 reference manual. 1995.
    • (1995) Occam 2. 1 reference manual


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.