메뉴 건너뛰기




Volumn 13, Issue 3, 2015, Pages 24-31

Improving the Security of Cryptographic Protocol Standards

Author keywords

formal methods; network protocols; protocol verification; security; standards

Indexed keywords

CRYPTOGRAPHY; FORMAL METHODS; MOBILE SECURITY; NETWORK SECURITY; STANDARDS;

EID: 84933052188     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.162     Document Type: Article
Times cited : (20)

References (17)
  • 1
    • 19744367735 scopus 로고    scopus 로고
    • OFMC: A Symbolic Model Checker for Security Protocols
    • D. Basin, S. Mödersheim, and L. Viganò, "OFMC: A Symbolic Model Checker for Security Protocols," Int'l J. Information Security, vol. 4, no. 3, 2005, pp. 181-208.
    • (2005) Int'l J. Information Security , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 2
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
    • Proc. 20th Int'l Conf. Computer Aided Verification
    • C. Cremers, "The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols," Proc. 20th Int'l Conf. Computer Aided Verification, LNCS 5123, 2008, pp. 414-418; www.cs.ox.ac.uk/people/cas.cremers/scyther.
    • (2008) LNCS 5123 , pp. 414-418
    • Cremers, C.1
  • 3
    • 84874349098 scopus 로고    scopus 로고
    • Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs
    • S. Meier, C. Cremers, and D. Basin, "Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs," J. Computer Security, vol. 21, no. 1, 2013, pp. 41-87.
    • (2013) J. Computer Security , vol.21 , Issue.1 , pp. 41-87
    • Meier, S.1    Cremers, C.2    Basin, D.3
  • 5
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 Security
    • D. Johnston and J. Walker, "Overview of IEEE 802.16 Security," IEEE Security & Privacy, vol. 2, no. 3, 2004, pp. 40-48.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 40-48
    • Johnston, D.1    Walker, J.2
  • 8
    • 40149109757 scopus 로고    scopus 로고
    • A Framework for Compositional Verification of Security Protocols
    • S. Andova et al., "A Framework for Compositional Verification of Security Protocols," Information and Computation, Feb. 2008, pp. 425-459.
    • (2008) Information and Computation , Issue.FEB , pp. 425-459
    • Andova, S.1
  • 9
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • D. Dolev and A. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198-208.
    • (1983) IEEE Trans. Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 84859302632 scopus 로고    scopus 로고
    • Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
    • Proc. 1st Int'l Conf. Principles of Security and Trust (POST 12) P. Degano and J.D. Guttman, eds.
    • D. Basin, C. Cremers, and S. Meier, "Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication," Proc. 1st Int'l Conf. Principles of Security and Trust (POST 12), LNCS 7215, P. Degano and J.D. Guttman, eds., 2012, pp. 129-148.
    • (2012) LNCS 7215 , pp. 129-148
    • Basin, D.1    Cremers, C.2    Meier, S.3
  • 12
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
    • C. Meadows, "Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer," Proc. IEEE Symp. Security and Privacy, 1999, pp. 216-231.
    • Proc. IEEE Symp. Security and Privacy, 1999 , pp. 216-231
    • Meadows, C.1
  • 13
    • 27844540827 scopus 로고    scopus 로고
    • Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer
    • C. Meadows, P.F. Syverson, and I. Cervesato, "Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer," J. Computer Security, vol. 12, no. 6, 2004, pp. 893-931.
    • (2004) J. Computer Security , vol.12 , Issue.6 , pp. 893-931
    • Meadows, C.1    Syverson, P.F.2    Cervesato, I.3
  • 14
    • 77956148457 scopus 로고    scopus 로고
    • How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC
    • Proc. 14th Int'l Conf. Financial Cryptography and Data Security
    • S. Matsuo et al., "How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC," Proc. 14th Int'l Conf. Financial Cryptography and Data Security, LNCS 6054, 2010, pp. 182-194.
    • (2010) LNCS 6054 , pp. 182-194
    • Matsuo, S.1
  • 17
    • 84881193419 scopus 로고    scopus 로고
    • The TAMARIN Prover for the Symbolic Analysis of Security Protocols
    • Proc. 25th Int'l Conf. Computer Aided Verification (CAV 13) 696-701
    • S. Meier et al., "The TAMARIN Prover for the Symbolic Analysis of Security Protocols," Proc. 25th Int'l Conf. Computer Aided Verification (CAV 13), LNCS 8044, 2013, pp. 696-701.
    • (2013) LNCS 8044
    • Meier, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.