메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 149-159

Analyzing Internet security protocols

Author keywords

Application software; Costs; Cryptographic protocols; Cryptography; Internet; Performance analysis; Read only memory; Security; Sockets; Software tools

Indexed keywords

APPLICATION PROGRAMS; COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER SOFTWARE; COSTS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC CONNECTORS; INTERNET; NETWORK SECURITY; ROM; SEEBECK EFFECT; SYSTEMS ENGINEERING;

EID: 84948954303     PISSN: 15302059     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2001.966816     Document Type: Conference Paper
Times cited : (15)

References (15)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • January
    • Martin Abadi and Roger Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 84961760201 scopus 로고    scopus 로고
    • Automatically detecting most vulnerabilities in cryptographic protocols
    • Jan
    • S. Brackin, "Automatically Detecting Most Vulnerabilities in Cryptographic Protocols", in The DARPA Information Survivability Conf and Exposition, Jan 2000, V. 1, pp 222-36
    • (2000) The DARPA Information Survivability Conf and Exposition , vol.1 , pp. 222-236
    • Brackin, S.1
  • 7
    • 0004253669 scopus 로고
    • Prentice Hall Series in Automatic Computation, Prentice-hall Inc. Englewood Cliffs, NJ
    • E. W. Dijkstra, A Discipline of Programming, Prentice Hall Series in Automatic Computation, Prentice-hall Inc. Englewood Cliffs, NJ, 1976.
    • (1976) A Discipline of Programming
    • Dijkstra, E.W.1
  • 8
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • Heidelberg: Springer, Berlin
    • J. Kelsey, B. Schneier, and D. Wagner, "Protocol interactions and the chosen protocol attack, " in Lecture Notes in Computer Science, 1361. pp. 91-104 Heidelberg: Springer, Berlin, 1998
    • (1998) Lecture Notes in Computer Science , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 9
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the nrl protocol analyzer
    • Catherine Meadows, "Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer, " IEEE Symposium on Security and Privacy, 1999.
    • (1999) IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December #12
    • Roger M. Needham, Michael D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, December 1978 vol. 21 #12, pp. 993-999
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 14
    • 84946432389 scopus 로고    scopus 로고
    • Analysis of the ssl 3. 0 protocol
    • D. Tygar Ed. USENIX Association
    • D. Wagner and B. Schneier, "Analysis of the SSL 3. 0 Protocol, " In D. Tygar Ed., USENIX Workshop on Electronic Commerce, pages 29-40. USENIX Association, 1996.
    • (1996) USENIX Workshop on Electronic Commerce , pp. 29-40
    • Wagner, D.1    Schneier, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.