메뉴 건너뛰기




Volumn 1895, Issue , 2000, Pages 159-174

Formal verification of cardholder registration in SET

Author keywords

[No Author keywords available]

Indexed keywords

THEOREM PROVING;

EID: 84944035753     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722599_10     Document Type: Conference Paper
Times cited : (33)

References (22)
  • 1
    • 4243352588 scopus 로고    scopus 로고
    • Research Report 460, University of Cambridge - Computer Laboratory
    • G. Bella. Message reception in the inductive approach. Research Report 460, University of Cambridge - Computer Laboratory, 1999.
    • (1999) Message Reception in the Inductive Approach
    • Bella, G.1
  • 2
    • 84947223089 scopus 로고    scopus 로고
    • Modelling agents’ knowledge inductively
    • ofLecture Notes in Comp. Sci. Springer-Verlag
    • G. Bella. Modelling agents’ knowledge inductively. In Proceedings of the 7th International Workshop on Security Protocols, volume 1796 of Lecture Notes in Comp. Sci. Springer-Verlag, 1999.
    • (1999) Proceedings of the 7Th International Workshop on Security Protocols , vol.1796
    • Bella, G.1
  • 3
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • of Lecture Notes in Comp. Sci, Springer-Verlag
    • G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In Proc. of the 5th Eur. Sym. on Res. in Comp. Sec., volume 1485 of Lecture Notes in Comp. Sci., pages 361-375. Springer-Verlag, 1998.
    • (1998) Proc of the 5Th Eur Sym on Res in Comp Sec , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 4
    • 85159707864 scopus 로고    scopus 로고
    • S. Brackin. Automatic formal analyses of two large commercial protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997. Available on the web at http://www.arca.com/proj papers/brackin/dimacs.pdf.
    • Brackin, S.1
  • 5
    • 85159711501 scopus 로고    scopus 로고
    • S. Brackin. Automatically detecting authentication limitations in commercial security protocols. In Proceedings of the 22nd National Conference on Information Systems Security, October 1999. Available on the web at http://www.arca.com/proj papers/brackin/Nissc99.pdf.
    • Brackin, S.1
  • 7
    • 0029210095 scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • IEEE Comp. Society Press
    • R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proc. of the 14th IEEE Sym. on Sec. and Privacy, pages 236-250. IEEE Comp. Society Press, 1995.
    • (1995) Proc of the 14Th IEEE Sym on Sec and Privacy , pp. 236-250
    • Kailar, R.1
  • 8
    • 84958771467 scopus 로고    scopus 로고
    • A sound logic for analysing electronic commerce protocols
    • J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, ofLecture Notes in Comp. Sci. Springer-Verlag
    • V. Kessler and H. Neumann. A sound logic for analysing electronic commerce protocols. In J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proc. of the 5th Eur. Sym. on Res. in Comp. Sec., volume 1485 of Lecture Notes in Comp. Sci. Springer-Verlag, 1998.
    • (1998) Proc of the 5Th Eur Sym on Res in Comp Sec , vol.1485
    • Kessler, V.1    Neumann, H.2
  • 10
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Comp. Society Press
    • G. Lowe. A hierarchy of authentication specifications. In Proc. of the 10th IEEE Comp. Sec. Found. Workshop, pages 31-43. IEEE Comp. Society Press, 1997.
    • (1997) Proc of the 10Th IEEE Comp Sec Found Workshop , pp. 31-43
    • Lowe, G.1
  • 14
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Comp. Society Press
    • C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250. IEEE Comp. Society Press, 2000.
    • (2000) Proceedings of DISCEX 2000 , pp. 237-250
    • Meadows, C.1
  • 15
    • 84958035071 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • R. Hirschfeld, editor, ofLecture Notes in Comp. Sci. Springer-Verlag
    • C. Meadows and P. Syverson. A formal specification of requirements for payment transactions in the SET protocol. In R. Hirschfeld, editor, Proceedings of Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer-Verlag, 1998.
    • (1998) Proceedings of Financial Cryptography 98 , vol.1465
    • Meadows, C.1    Syverson, P.2
  • 16
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978.
    • (1978) Comm of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.2
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Comp. Sec., 6:85-128, 1998.
    • (1998) J of Comp Sec , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 19
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Trans. On Inform. and Sys. Sec., 2(3):332-351, 1999.
    • (1999) ACM Trans on Inform and Sys Sec , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 20
    • 84904250592 scopus 로고
    • RSA Laboratories, Available electronically at
    • RSA Laboratories. PKCS-6: Extended-Certificate Syntax Standard, 1993. Available electronically at http://www.rsasecurity.com/rsalabs/pkcs.
    • (1993) PKCS-6: Extended-Certificate Syntax Standard
  • 21
    • 0037615406 scopus 로고
    • RSA Laboratories, Available electronically at
    • RSA Laboratories. PKCS-7: Cryptographic Message Syntax Standard, 1993. Available electronically at http://www.rsasecurity.com/rsalabs/pkcs.
    • (1993) PKCS-7: Cryptographic Message Syntax Standard
  • 22
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • S. Schneider. Verifying authentication protocols in CSP. IEEE Trans. On Software Engineering, 24(9):741-758, 1998.
    • (1998) IEEE Trans on Software Engineering , vol.24 , Issue.9 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.