메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 129-144

Complementing computational protocol analysis with formal specifications

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY;

EID: 84902480071     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_10     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 4
    • 84937407919 scopus 로고    scopus 로고
    • Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation
    • In, Springer-Verlag
    • M. Backes, C. Jacobi, and B. Pfitzmann. Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. In Formal Methods-Getting IT Right, pages 310-329. Springer-Verlag, 2002.
    • (2002) Formal Methods-Getting IT Right , pp. 310-329
    • Backes, M.1    Jacobi, C.2    Pfitzmann, B.3
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • In, Springer-Verlag, LNCS Volume 1807/2000
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Advances in Cryptology-Eurocrypt, pages 139-155. Springer-Verlag, 2000. LNCS Volume 1807/2000.
    • (2000) Advances in Cryptology-Eurocrypt , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 0005078946 scopus 로고
    • Entity Authentication and Key Distribution
    • In, Springer-Verlag, LNCS Volume 773/1993
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology, pages 110-125. Springer-Verlag, 1993. LNCS Volume 773/1993.
    • (1993) Advances in Cryptology , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0001940580 scopus 로고
    • Provably Secure Session Key Distribution: The Three Party Case
    • In, ACM Press
    • M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In 27th ACM Symposium on the Theory of Computing, pages 57-66. ACM Press, 1995.
    • (1995) 27th ACM Symposium on the Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84882763552 scopus 로고    scopus 로고
    • Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis
    • In, British Computer Society Press, Dec
    • C. Boyd and K. Viswanathan. Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. In Formal Aspects of Security-FASec 2002, pages 209-223. British Computer Society Press, Dec 2002.
    • (2002) Formal Aspects of Security-FASec 2002 , pp. 209-223
    • Boyd, C.1    Viswanathan, K.2
  • 10
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • In, Springer-Verlag, May, LNCS Volume 2045/2001
    • R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Advances in Cryptology-Eurocrypt 2001:, pages 453-474. Springer-Verlag, May 2001. LNCS Volume 2045/2001.
    • (2001) Advances in Cryptology-Eurocrypt 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 33645399350 scopus 로고    scopus 로고
    • Mutual Authentication and Key Exchange Protocol for Low Power Devices
    • In, Springer-Verlag
    • M. Jakobsson and D. Pointcheval. Mutual Authentication and Key Exchange Protocol for Low Power Devices. In Financial Cryptography, pages 178-195. Springer-Verlag, 2001.
    • (2001) Financial Cryptography , pp. 178-195
    • Jakobsson, M.1    Pointcheval, D.2
  • 15
    • 0005076119 scopus 로고    scopus 로고
    • Cryptographic Security of Reactive Systems
    • In Steve Schneider and Peter Ryan, editors, Reed Elsevier
    • B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic Security of Reactive Systems. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Reed Elsevier, 2000.
    • (2000) Electronic Notes in Theoretical Computer Science , vol.32
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 17
    • 84880904783 scopus 로고    scopus 로고
    • OAEP Reconsidered
    • In, Springer-Verlag, LNCS Volume 2139/2001
    • V. Shoup. OAEP Reconsidered. In Advances in Cryptology-CRYPTO 2001, pages 239-259. Springer-Verlag, 2001. LNCS Volume 2139/2001.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 239-259
    • Shoup, V.1
  • 18
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
    • In, Springer-Verlag
    • D.S. Wong and A.H. Chan. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. In Advances in Cryptology-Asiacrypt 2001. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology-Asiacrypt 2001
    • Wong, D.S.1    Chan, A.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.