메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 206-220

Game analysis of abuse-free contract signing

Author keywords

Computer security; Conferences; Electronic commerce; Electronic mail; Forward contracts; Logic; Protocols; Waste materials

Indexed keywords

ELECTRONIC COMMERCE; ELECTRONIC MAIL; FORMAL LOGIC; FORMAL VERIFICATION; NETWORK PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS; WASTES;

EID: 84948779843     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021817     Document Type: Conference Paper
Times cited : (61)

References (22)
  • 2
    • 33646178489 scopus 로고    scopus 로고
    • MOCHA: Modularity in model checking
    • A. Hu and M. Vardi, editors, CAV 98: Computer-aided Verification, Springer-Verlag
    • R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. MOCHA: modularity in model checking. In A. Hu and M. Vardi, editors, CAV 98: Computer-aided Verification, Lecture Notes in Computer Science 1427, pages 521-525. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1427 , pp. 521-525
    • Alur, R.1    Henzinger, T.2    Mang, F.3    Qadeer, S.4    Rajamani, S.5    Tasiran, S.6
  • 4
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86-99, Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (1998) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 86-99
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 5
    • 84856533229 scopus 로고    scopus 로고
    • Exploring fair exchange protocols using specification animation
    • The Third International Workshop on Information Security - ISW2000, Australia, Dec. Springer-Verlag
    • C. Boyd and P. Kearney. Exploring fair exchange protocols using specification animation. In The Third International Workshop on Information Security - ISW2000, Lecture Notes in Computer Science, pages 209-223, Australia, Dec. 2000. Springer-Verlag.
    • (2000) Lecture Notes in Computer Science , pp. 209-223
    • Boyd, C.1    Kearney, P.2
  • 9
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • Advances in Cryptology: Proceedings of Crypto'99, Springer-Verlag
    • J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology: Proceedings of Crypto'99, volume 1666 of Lecture Notes in Computer Science, pages 449-466. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.3
  • 10
    • 84906087402 scopus 로고    scopus 로고
    • Abstract interpretation of game properties
    • SAS 2000: Intertional Symposium on Static Analysis, Springer-Verlag
    • T. Henzinger, R. Manjumdar, F. Mang, and J.-F. Raskin. Abstract interpretation of game properties. In SAS 2000: Intertional Symposium on Static Analysis, Lecture Notes in Computer Science, pages 220-239. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , pp. 220-239
    • Henzinger, T.1    Manjumdar, R.2    Mang, F.3    Raskin, J.-F.4
  • 11
    • 84944080333 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • K. Larsen and M. Nielsen, editors, Concurrency Theory - Concur 2001, Aalborg, Denmark, Aug. Springer-Verlag
    • S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In K. Larsen and M. Nielsen, editors, Concurrency Theory - Concur 2001, volume 2154 of Lecture Notes in Computer Science, pages 551-565, Aalborg, Denmark, Aug. 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2154 , pp. 551-565
    • Kremer, S.1    Raskin, J.-F.2
  • 12
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Nov.
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, Nov. 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Lecture Notes in Computer Science, 1055:147-157, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-157
    • Lowe, G.1
  • 14
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    • C. A. Meadows. Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches. Lecture Notes in Computer Science, 1146:351-365, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 351-365
    • Meadows, C.A.1
  • 15
    • 24944538962 scopus 로고    scopus 로고
    • Certified E-mail with invisible post offices
    • Available from author; an invited
    • S. Micali. Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 conference, 1997.
    • (1997) RSA '97 Conference
    • Micali, S.1
  • 16
    • 0030705795 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • IEEE Computer Society Press, June
    • L. C. Paulson. Proving properties of security protocols by induction. In Proceedings of the 10th Computer Security Foundations Workshop, pages 70-83. IEEE Computer Society Press, June 1997.
    • (1997) Proceedings of the 10th Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.C.1
  • 19
    • 84944317155 scopus 로고    scopus 로고
    • Analysis of abuse-free contract signing
    • Financial Cryptography '00, Anguilla, British West Indies, Feb. Springer-Verlag
    • V. Shmatikov and J. Mitchell. Analysis of abuse-free contract signing. In Financial Cryptography '00, volume 1962 of Lecture Notes in Computer Science, pages 174-191, Anguilla, British West Indies, Feb. 2000. Springer-Verlag.
    • (2000) Lecture Notes in Computer Science , vol.1962 , pp. 174-191
    • Shmatikov, V.1    Mitchell, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.