메뉴 건너뛰기




Volumn 65, Issue , 2002, Pages 151-166

Security analysis of the cliques protocols suites: First results

Author keywords

Cliques protocols; Diffie hellman; Group protocols; Systematic analysis

Indexed keywords

INFORMATION TECHNOLOGY;

EID: 84904244789     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 4
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A Compiler for the Analysis of Security Protocols
    • G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. In Journal of Computer Security, Vol. 6, pp. 53-84, 1998.
    • (1998) In Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 5
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C. Meadows. The NRL Protocol Analyzer: an Overview. In Journal of Logic Programming, Vol. 26(2), pp. 113-131, 1996.
    • (1996) In Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 6
    • 0012795935 scopus 로고    scopus 로고
    • Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives
    • WITS 2000
    • C. Meadows. Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives. In Proceedings of the Workshop on Issues in the Theory of Security (WITS 2000), 2000.
    • (2000) In Proceedings of the Workshop On Issues In the Theory of Security
    • Meadows, C.1
  • 9
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L C Paulson. The inductive approach to verifying cryptographic protocols. In Journal of computer Security, Vol. 6, pp. 85-128, 1998.
    • (1998) In Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.