메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 92-103

Security protocol design via authentication tests

Author keywords

Authentication; Authorization; Contracts; Credit cards; Cryptographic protocols; Cryptography; Electronic commerce; Electronic equipment testing; National security; Process design

Indexed keywords

COMMERCE; CONTRACTS; CRYPTOGRAPHY; DESIGN; ELECTRONIC COMMERCE; ELECTRONIC EQUIPMENT; ELECTRONIC EQUIPMENT TESTING; EQUIPMENT TESTING; NATIONAL SECURITY; OSCILLATORS (ELECTRONIC); PROCESS DESIGN; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84948739411     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021809     Document Type: Conference Paper
Times cited : (63)

References (19)
  • 2
    • 33750247207 scopus 로고    scopus 로고
    • Verifying the SET purchase protocols
    • Technical report, Cambridge University Computer Laboratory, Short version appeared June, 2001
    • G. Bella, F. Massacci, and L. C. Paulson. Verifying the SET purchase protocols. Technical report, Cambridge University Computer Laboratory, 2001. Short version appeared in International Joint Conference on Automated Reasoning, June, 2001. Available at http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html.
    • (2001) International Joint Conference on Automated Reasoning
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3
  • 9
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • R. Gorrieri and R. Focardi, editors, Foundations of Security Analysis and Design, Springer Verlag
    • J. D. Guttman. Security goals: Packet trajectories and strand spaces. In R. Gorrieri and R. Focardi, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer Verlag, 2001.
    • (2001) LNCS , vol.2171
    • Guttman, J.D.1
  • 14
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society Press, July
    • A. Perrig and D. X. Song. Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000.
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Song, D.X.2
  • 16
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automated checker for security protocol analysis
    • IEEE Computer Society Press, June
    • D. X. Song. Athena: a new efficient automated checker for security protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999.
    • (1999) Proceedings of the 12th IEEE Computer Security Foundations Workshop
    • Song, D.X.1
  • 18
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • January
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. Computer, 25(1):39-52, January 1992.
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 19
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T. Y. C. Woo and S. S. Lam. A lesson on authentication protocol design. Operating Systems Review, pages 24-37, 1994.
    • (1994) Operating Systems Review , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.