메뉴 건너뛰기




Volumn 2152, Issue , 2001, Pages 91-104

Mechanical proofs about a non-repudiation protocol

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LOGIC;

EID: 84949486769     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44755-5_8     Document Type: Conference Paper
Times cited : (28)

References (19)
  • 1
    • 4243352588 scopus 로고    scopus 로고
    • Research Report 460, University of Cambridge — Computer Laboratory
    • G. Bella. Message Reception in the Inductive Approach. Research Report 460, University of Cambridge — Computer Laboratory, 1999.
    • (1999) Message Reception in the Inductive Approach
    • Bella, G.1
  • 5
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos Version IV: Inductive Analysis of the Secrecy Goals
    • J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Springer-Verlag
    • G. Bella and L.C. Paulson. Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proc. of the 5th European Symposium on Research in Computer Security (ESORICS’98), LNCS 1485, pages 361–375. Springer-Verlag, 1998.
    • (1998) Proc. Of the 5Th European Symposium on Research in Computer Security (ESORICS’98), LNCS 1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 8
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C.A. Meadows. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming, 26(2):113–131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.A.1
  • 12
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L.C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85–128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.