메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 55-70

Pattern-matching spi-calculush

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS;

EID: 84902449094     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (23)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 9
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • In, IEEE Computer Society Press
    • E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • Cohen, E.1
  • 12
    • 0034835462 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • In, IEEE Computer Society Press
    • A.D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. In Nth IEEE Computer Security Foundations Workshop, pages 145-159. IEEE Computer Society Press, 2001.
    • (2001) Nth IEEE Computer Security Foundations Workshop , pp. 145-159
    • Gordon, A.D.1    Jeffrey, A.2
  • 13
    • 84948759702 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • In, IEEE Computer Society Press
    • A.D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop, pages 77-91. IEEE Computer Society Press, 2002.
    • (2002) 15th IEEE Computer Security Foundations Workshop , pp. 77-91
    • Gordon, A.D.1    Jeffrey, A.2
  • 16
    • 0033683607 scopus 로고    scopus 로고
    • Towards automatic verification of authentication protocols on an unbounded network
    • In, IEEE Computer Society Press
    • J. Heather and S. Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th IEEE Computer Security Foundations Workshop, pages 132-143. IEEE Computer Society Press, 2000.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 132-143
    • Heather, J.1    Schneider, S.2
  • 18
    • 0003735470 scopus 로고    scopus 로고
    • Model checking for security protocols
    • In, Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997
    • W. Marrero, E.M. Clarke, and S. Jha. Model checking for security protocols. In D1MACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997.
    • (1997) D1MACS Workshop on Design and Formal Verification of Security Protocols
    • Marrero, W.1    Clarke, E.M.2    Jha, S.3
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • In, IEEE Computer Society Press
    • A.W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In 8th IEEE Computer Security Foundations Workshop, pages 98-107. IEEE Computer Society Press, 1995.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 98-107
    • Roscoe, A.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.