메뉴 건너뛰기




Volumn 2420, Issue , 2002, Pages 519-531

Symbolic semantics and analysis for crypto-CCS with (Almost) generic inference systems

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; SEMANTICS;

EID: 84956982499     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45687-2_43     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • [1] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • LNCS
    • [2] R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of CONCUR, volume 1877 of LNCS, pages 380–394, 2000.
    • (2000) Proc. Of CONCUR , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 3
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Press
    • [3] B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of CSFW, IEEE Press, pages 82–96, 2001.
    • (2001) Proc. Of CSFW , pp. 82-96
    • Blanchet, B.1
  • 4
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • LNCS
    • [4] M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. of ICALP, LNCS, pages 667–681, 2001.
    • (2001) Proc. Of ICALP , pp. 667-681
    • Boreale, M.1
  • 5
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • IEEE Press
    • [5] M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In Proc. of CSFW, IEEE Press, pages 160–173, 2001.
    • (2001) Proc. Of CSFW , pp. 160-173
    • Fiore, M.1    Abadi, M.2
  • 6
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • LNCS
    • [6] R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of FM’99, volume 1708 of LNCS, pages 794–813, 1999.
    • (1999) Proc. Of FM’99 , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 7
    • 0012486231 scopus 로고    scopus 로고
    • A symbolic approach to value-passing processes
    • J. Bergstra, A. Ponse, and S. Smolka, editors, North-Holland
    • [7] A. Ingólfsdttir, and H. Lin. A symbolic approach to value-passing processes. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 427–478. North-Holland, 2001.
    • (2001) Handbook of Process Algebra , pp. 427-478
    • Ingólfsdttir, A.1    Lin, H.2
  • 9
    • 0033746638 scopus 로고    scopus 로고
    • Verification of security protocols using LOTOS - Method and application
    • [9] G. Leduc and F. Germeau. Verification of security protocols using LOTOS - method and application. Computer Communications, 23(12):1089–1103, 2000.
    • (2000) Computer Communications , vol.23 , Issue.12 , pp. 1089-1103
    • Leduc, G.1    Germeau, F.2
  • 10
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham Schroeder public-key protocol using FDR
    • [10] G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proc. of TACAS, volume 1055 of LNCS, pages 147–166, 1996.
    • (1996) Proc. Of TACAS, Volume 1055 Of LNCS , pp. 147-166
    • Lowe, G.1
  • 14
    • 0000544858 scopus 로고    scopus 로고
    • Languages for description and analysis of authentication protocols
    • World Scientific
    • [14] F. Martinelli. Languages for description and analysis of authentication protocols. In Proc. of ICTCS, pages 304–315. World Scientific, 1998.
    • (1998) Proc. Of ICTCS , pp. 304-315
    • Martinelli, F.1
  • 15
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press
    • [15] J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. of CCS, ACM Press, 2001.
    • (2001) Proc. Of CCS
    • Millen, J.1    Shmatikov, V.2
  • 17
    • 0031640904 scopus 로고    scopus 로고
    • Honest ideals on strand spaces
    • IEEE Computer Society Press
    • [17] Thayer, Herzog, and Guttman D. Honest ideals on strand spaces. In Proc. of CSFW. IEEE Computer Society Press, 1998.
    • (1998) Proc. Of CSFW
    • Thayer, H.1    Guttman, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.