메뉴 건너뛰기




Volumn 1275, Issue , 1997, Pages 121-136

Using a PVS embedding of CSP to verify authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; EMBEDDINGS; FORMAL LOGIC; NETWORK SECURITY; SEMANTICS;

EID: 84949641590     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0028390     Document Type: Conference Paper
Times cited : (40)

References (17)
  • 1
    • 84949677030 scopus 로고    scopus 로고
    • Deciding Cryptographic Protocol Adequacy with HOL: The Implementation
    • Springer-Verlag, LNCS 1125
    • S. H. Brackin. Deciding Cryptographic Protocol Adequacy with HOL: The Implementation. In TPHOLs’96. Springer-Verlag, LNCS 1125, 1996.
    • (1996) TPHOLs’96
    • Brackin, S.H.1
  • 2
    • 84871825723 scopus 로고    scopus 로고
    • Mechanical Verification of the full Needham-Schroeder public key protocol
    • Royal HoEoway, University of London
    • J. Bryans and S. Schneider. Mechanical Verification of the full Needham-Schroeder public key protocol. Technical report, Royal HoEoway, University of London, 1997.
    • (1997) Technical report
    • Bryans, J.1    Schneider, S.2
  • 3
    • 0004215976 scopus 로고
    • A Logic of Authentication
    • Digital Equipment Corporation, System Research Center
    • M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital Equipment Corporation, System Research Center, 1989.
    • (1989) Technical Report 39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 4
    • 0025488389 scopus 로고
    • Mechanizing CSP trace theory in higher order logic
    • A. J. Camilleri. Mechanizing CSP trace theory in higher order logic. IEEE Transactions on Software Engineering, 16(9):993-1004, 1990.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.9 , pp. 993-1004
    • Camilleri, A.J.1
  • 6
    • 84949651836 scopus 로고    scopus 로고
    • Embedding CSP in PVS. An AppEcation to Authentication Protocols
    • Royal Holoway, CSD-TR-97-12
    • B. Dutertre and S. Schneider. Embedding CSP in PVS. An AppEcation to Authentication Protocols. Technical report, Royal Holoway, CSD-TR-97-12.
    • Technical report
    • Dutertre, B.1    Schneider, S.2
  • 9
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Springer-Verlag, LNCS 1055
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In Proc. of TACAS’96. Springer-Verlag, LNCS 1055, 1996.
    • (1996) Proc. of TACAS’96
    • Lowe, G.1
  • 10
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Comm, of the ACM, 21(12):993-999, 1978.
    • (1978) Comm, of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 12
    • 17744375732 scopus 로고    scopus 로고
    • Proving Properties of Security Protocols by Induction
    • Computer Laboratory, University of Cambridge
    • L. Paulson. Proving Properties of Security Protocols by Induction. Technical Report TR409, Computer Laboratory, University of Cambridge, 1996.
    • (1996) Technical Report TR409
    • Paulson, L.1
  • 14
    • 1442295999 scopus 로고    scopus 로고
    • Using CSP for protocol analysis: The Needham-Schroeder Public Key Protocol
    • Royal HoEoway
    • S. Schneider. Using CSP for protocol analysis: the Needham-Schroeder Public Key Protocol. Technical Report CSD-TR-96-14, Royal HoEoway, 1996.
    • (1996) Technical Report CSD-TR-96-14
    • Schneider, S.1
  • 17
    • 84949653223 scopus 로고
    • An approach to process algebra using IMPS
    • The MITRE Corporation
    • F. J. Thayer. An approach to process algebra using IMPS. Technical Report MP-94B193, The MITRE Corporation, 1994.
    • (1994) Technical Report MP-94B193
    • Thayer, F.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.