메뉴 건너뛰기




Volumn 8893, Issue , 2014, Pages 215-235

Improving the iso/iec 11770 standard for key management techniques

Author keywords

[No Author keywords available]

Indexed keywords

INDUSTRIAL MANAGEMENT; STANDARDIZATION;

EID: 84917705583     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-14054-4_13     Document Type: Conference Paper
Times cited : (14)

References (25)
  • 2
    • 78049402611 scopus 로고    scopus 로고
    • Modeling and analyzing security in the presence of compromising adversaries
    • In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
    • Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 340-356. Springer, Heidelberg (2010)
    • (2010) ESORICS 2010. LNCS , vol.6345 , pp. 340-356
    • Basin, D.1    Cremers, C.2
  • 4
    • 84892725087 scopus 로고    scopus 로고
    • Provably repairing the ISO/IEC 9798 standard for entity authentication
    • Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO/IEC 9798 standard for entity authentication. Journal of Computer Security 21(6), 817-846 (2013)
    • (2013) Journal of Computer Security , vol.21 , Issue.6 , pp. 817-846
    • Basin, D.1    Cremers, C.2    Meier, S.3
  • 6
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • In: Darnell, M. (ed.), Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
    • (1997) Cryptography and Coding 1997. LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 9
    • 77950669596 scopus 로고    scopus 로고
    • Parsing ambiguities in authentication and key establishment protocols
    • Chen, L., Mitchell, C.J.: Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics 3(1), 82-94 (2010)
    • (2010) Int. J. Electron. Secur. Digit. Forensics , vol.3 , Issue.1 , pp. 82-94
    • Chen, L.1    Mitchell, C.J.2
  • 10
    • 77950665222 scopus 로고    scopus 로고
    • Attacks on an ISO/IEC 11770-2 key establishment protocol
    • Cheng, Z., Comley, R.: Attacks on an ISO/IEC 11770-2 key establishment protocol. I. J. Network Security 3(3), 290-295 (2006)
    • (2006) I. J. Network Security , vol.3 , Issue.3 , pp. 290-295
    • Cheng, Z.1    Comley, R.2
  • 11
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, falsification, and analysis of security protocols
    • In: Gupta, A., Malik, S. (eds.), Springer, Heidelberg, Available for download at
    • Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008), Available for download at http://www.cs.ox.ac.uk/people/cas.cremers/scyther/index.html
    • (2008) CAV 2008. LNCS , vol.5123 , pp. 414-418
    • Cremers, C.J.F.1
  • 12
    • 85099527835 scopus 로고    scopus 로고
    • Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal
    • Cremers, C., Feltz, M.: Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal. Designs, Codes and Cryptography, 1-36 (2013)
    • (2013) Designs, Codes and Cryptography , pp. 1-36
    • Cremers, C.1    Feltz, M.2
  • 13
    • 84906978087 scopus 로고    scopus 로고
    • Operational Semantics and Verification of Security Protocols
    • Springer
    • Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer (2012)
    • (2012) Information Security and Cryptography
    • Cremers, C.1    Mauw, S.2
  • 15
    • 84859327942 scopus 로고    scopus 로고
    • Guidelines on algorithms usage and key management
    • European Payments Council
    • European Payments Council. Guidelines on algorithms usage and key management. Technical report, EPC342-08 Version 1.1 (2009)
    • (2009) Technical report, EPC342-08 Version 1.1
  • 16
    • 0032545823 scopus 로고    scopus 로고
    • Weakness in the Helsinki protocol
    • Horng, G., Hsu, C.-K.: Weakness in the Helsinki protocol. Electronics Letters 34(1), 354-355 (1998)
    • (1998) Electronics Letters , vol.34 , Issue.1 , pp. 354-355
    • Horng, G.1    Hsu, C.-K.2
  • 18
    • 84917694944 scopus 로고    scopus 로고
    • ISO/IEC 11770-2:2008, Information technology - Security techniques - Key Management - Part 2: Mechanisms using Symmetric Techniques, 2009
    • International Organization for Standardization, Genève, Switzerland, September
    • International Organization for Standardization, Genève, Switzerland. ISO/IEC 11770-2:2008, Information technology - Security techniques - Key Management - Part 2: Mechanisms using Symmetric Techniques, 2009. Incorporating corrigendum (September 2009)
    • (2009) Incorporating corrigendum
  • 20
    • 77954613404 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Report 2005/176, (retrieved on June 1, 2014)
    • Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. Cryptology ePrint Archive, Report 2005/176 (2005), http://eprint.iacr.org/ (retrieved on June 1, 2014)
    • (2005) Cryptology ePrint Archive
    • Krawczyk, H.1
  • 23
  • 24
    • 0345412448 scopus 로고    scopus 로고
    • Fixing a problem in the Helsinki protocol
    • Mitchell, C.J., Yeun, C.Y.: Fixing a problem in the Helsinki protocol. SIGOPS Oper. Syst. Rev. 32(4), 21-24 (1998)
    • (1998) SIGOPS Oper. Syst. Rev , vol.32 , Issue.4 , pp. 21-24
    • Mitchell, C.J.1    Yeun, C.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.