메뉴 건너뛰기




Volumn 1990, Issue , 2001, Pages 108-122

Soft constraints for security protocol analysis: Confidentiality

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT SATISFACTION PROBLEMS; INTERNET PROTOCOLS; COMPUTATIONAL LINGUISTICS; CONSTRAINT THEORY; NETWORK PROTOCOLS; PETROLEUM REFINING;

EID: 84948414101     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45241-9_8     Document Type: Article
Times cited : (15)

References (27)
  • 1
  • 8
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, pages 201–236, 1997.
    • (1997) Journal of the ACM , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 10
    • 3042537645 scopus 로고    scopus 로고
    • Formal Analysis of the Kerberos Authentication System
    • G. Bella and E. Riccobene. Formal Analysis of the Kerberos Authentication System. Journal of Universal Computer Science, 3(12):1337–1381, 1997.
    • (1997) Journal of Universal Computer Science , vol.3 , Issue.12 , pp. 1337-1381
    • Bella, G.1    Riccobene, E.2
  • 11
    • 0027206949 scopus 로고
    • The Calculus of Fuzzy Restrictions as a Basis for Flexible Constraint Satisfaction
    • IEEE Press
    • D. Dubois, H. Fargier, and H. Prade. The Calculus of Fuzzy Restrictions as a Basis for Flexible Constraint Satisfaction. In Proc. of IEEE International Conference on Fuzzy Systems, pages 1131–1136. IEEE Press, 1993.
    • (1993) Proc. Of IEEE International Conference on Fuzzy Systems , pp. 1131-1136
    • Dubois, D.1    Fargier, H.2    Prade, H.3
  • 14
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-Key Authentication Protocol
    • G. Lowe. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 56(3):131–133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 18
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993–999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85–128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 84948394408 scopus 로고
    • Federal Information Processing Standards Publications, FIPS Pub. 46
    • CHE AUTORE METTIAMO QUI? Data Encryption Standard. National Bureau of Standards, Jan 1977. Federal Information Processing Standards Publications, FIPS Pub. 46.
    • (1977) National Bureau of Standards , vol.Jan
  • 21
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120–126, 1976.
    • (1976) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 0001553684 scopus 로고
    • Possibilistic Constraint Satisfaction Problems, or “How to Handle Soft Constraints?”
    • T. Schiex. Possibilistic Constraint Satisfaction Problems, or “How to Handle Soft Constraints?”. In Proc. of 8th Conference on Uncertainty in AI, pages 269–275, 1992.
    • (1992) Proc. Of 8Th Conference on Uncertainty in AI , pp. 269-275
    • Schiex, T.1
  • 25
    • 0000961248 scopus 로고
    • Domains for denotational semantics
    • Springer-Verlag
    • D. S. Scott. Domains for denotational semantics. In Proc. ICALP. Springer-Verlag, 1982.
    • (1982) Proc. ICALP
    • Scott, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.