메뉴 건너뛰기




Volumn 2133, Issue , 2001, Pages 74-81

Making sense of specifications: The formalization of SET (Extended abstract)

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84949979013     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44810-1_11     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. M. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 January , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.M.2
  • 8
    • 0029210095 scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • IEEE Computer Society Press
    • R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proceedings of the 14th IEEE Symposium on Security and Privacy, pages 236-250. IEEE Computer Society Press, 1995.
    • (1995) Proceedings of the 14Th IEEE Symposium on Security and Privacy , pp. 236-250
    • Kailar, R.1
  • 10
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(18-30):53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.18-30 , pp. 53-84
    • Lowe, G.1
  • 11
    • 84949935723 scopus 로고    scopus 로고
    • SET Secure Electronic Transaction Specification: Business DescriptionMay
    • Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
    • (1997)
  • 12
    • 84949990911 scopus 로고    scopus 로고
    • SET Secure Electronic Transaction Specification: Programmer’s Guide, May
    • Mastercard & VISA. SET Secure Electronic Transaction Specification: Programmer’s Guide, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
    • (1997)
  • 13
    • 84949967765 scopus 로고    scopus 로고
    • . SET Secure Electronic Transaction Specification: Protocol Definition, May
    • Mastercard & VISA. SET Secure Electronic Transaction Specification: Protocol Definition, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
    • (1997)
  • 15
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.2
  • 17
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 19
    • 84949969847 scopus 로고
    • RSA Security-Available electronically at , 19: Extended-Certificate Syntax Standard
    • RSA Laboratories, RSA Security-Available electronically at http://www.rsasecurity.com/rsalabs/pkcs. 19: Extended-Certificate Syntax Standard, 1993.
    • (1993)
  • 20
    • 84949981934 scopus 로고
    • RSA Security-Available electronically at , 20: Cryptographic Message Syntax Standard
    • RSA Laboratories, RSA Security-Available electronically at http://www.rsasecurity.com/rsalabs/pkcs. 20: Cryptographic Message Syntax Standard, 1993.
    • (1993)
  • 21
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirement
    • P. Syverson and C. Meadows. A formal language for cryptographic protocol requirement. Designs, Codes and Cryptography, 7(xxx):27-59, 1996.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.30 , pp. 27-59
    • Syverson, P.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.