메뉴 건너뛰기




Volumn , Issue , 2001, Pages 373-376

A tool for lazy verification of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

EFFICIENCY; NETWORK SECURITY;

EID: 84944686372     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASE.2001.989832     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 1
    • 85116870609 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Marseille France
    • R. Amadio and D Lugiez. On the Reachability Problem in Cryptographic Protocols. In RR-INRIA - 3915. Marseille (France).
    • RR-INRIA - 3915
    • Amadio, R.1    Lugiez, D.2
  • 2
    • 84961379291 scopus 로고    scopus 로고
    • Lazy infinite-state analysis of security protocols
    • R. Baumgart, editor, Springer-Verlag, Düsseldorf Germany
    • D. Basin. Lazy Infinite-State Analysis of Security Protocols. In R. Baumgart, editor, Secure Networking - CQRE'99, volume 1740 of Lecture Notes in Computer Science, pages 30-42. Springer-Verlag, Düsseldorf (Germany), 1999.
    • (1999) Secure Networking - CQRE'99, Volume 1740 of Lecture Notes in Computer Science , pp. 30-42
    • Basin, D.1
  • 3
    • 0030716978 scopus 로고    scopus 로고
    • Towards the formal verification of electronic commerce protocols
    • IEEE Computer Society
    • D. Bolignano. Towards the formal verification of electronic commerce protocols. In IEEE Computer Security Foundations Workshop, pages 133-146. IEEE Computer Society, 1997.
    • (1997) IEEE Computer Security Foundations Workshop , pp. 133-146
    • Bolignano, D.1
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Also STAN-CS-81-854, 1981, Stanford U
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29:198-208, 1983. Also STAN-CS-81-854, 1981, Stanford U.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 0031633395 scopus 로고    scopus 로고
    • CASpEr: A compiler for the analysis of security protocols
    • G. Lowe. Casper: a compiler for the analysis of security protocols. Journal of Computer Security, 6(1):53-84,1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 12
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 5-36
    • Meadows, C.1
  • 13
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using Murø
    • IEEE Computer Society
    • J. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using Murø. In IEEE Symposium on Security and Privacy, pages 141-154. IEEE Computer Society, 1997.
    • (1997) IEEE Symposium on Security and Privacy , pp. 141-154
    • Mitchell, J.1    Mitchell, M.2    Stern, U.3
  • 15
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.