메뉴 건너뛰기




Volumn 2502, Issue , 2002, Pages 212-229

Formal security analysis with interacting state machines

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS; SMART CARDS;

EID: 84957035924     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45853-0_13     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 1
    • 4544236364 scopus 로고    scopus 로고
    • Version 1.0, July
    • [AETS01] Atmel, Hitachi Europe, Infineon Technologies, and Philips Semiconductors. Smartcard IC Platform Protection Profile, Version 1.0, July 2001.
    • (2001) Smartcard IC Platform Protection Profile
  • 3
    • 84958050405 scopus 로고    scopus 로고
    • Csp2B: A practical approach to combining CSP and B
    • [But99] Michael Butler. csp2B: A practical approach to combining CSP and B. In Proceedings of FM’99: World Congress on Formal Methods, pages 490–508, 1999. http://www.dsse.ecs.soton.ac.uk/techreports/99-2.html.
    • (1999) Proceedings of FM’99: World Congress on Formal Methods , pp. 490-508
    • Butler, M.1
  • 4
    • 84956979359 scopus 로고    scopus 로고
    • Version 2.1
    • [CC99] Common Criteria for Information Technology Security Evaluation (CC), Version 2.1, 1999. ISO/IEC 15408.
    • (1999) ISO/IEC 15408
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [DY83] Danny Dolev and Andrew C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198–208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 IT , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 9
    • 84956997714 scopus 로고
    • June
    • [ITS91] Information Technology Security Evaluation Criteria (ITSEC), June 1991.
    • (1991)
  • 12
    • 0034244831 scopus 로고    scopus 로고
    • A Formal Security Model for Microprocessor Hardware
    • August
    • [LKW00] Volkmar Lotz, Volker Kessler, and Georg Walter. A Formal Security Model for Microprocessor Hardware. In IEEE Transactions on Software Engineering, volume 26, pages 702–712, August 2000. http://www.computer.org/tse/ts2000/e8toc.htm.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , pp. 702-712
    • Lotz, V.1    Kessler, V.2    Walter, G.3
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer-Verlag
    • [Low96] Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, volume 1055, pages 147–166. Springer-Verlag, 1996.
    • (1996) Proceedings of TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 15
    • 0001383866 scopus 로고
    • An introduction to input/output automata
    • [LT89] Nancy Lynch and Mark Tuttle. An introduction to input/output automata. CWI Quarterly, 2(3):219–246, 1989. http://theory.lcs.mit.edu/tds/papers/Lynch/CWI89.html.
    • (1989) CWI Quarterly , vol.2 , Issue.3 , pp. 219-246
    • Lynch, N.1    Tuttle, M.2
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • [Pau98] Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85–128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 23
    • 20444448320 scopus 로고    scopus 로고
    • Extended description techniques for security engineering
    • M. Dupuy and P. Paradinas, editors, Kluwer Academic Publishers
    • [WW01] Guido Wimmel and Alexander Wisspeintner. Extended description techniques for security engineering. In M. Dupuy and P. Paradinas, editors, International Conference on Information Security (IFIP/SEC). Kluwer Academic Publishers, 2001.
    • (2001) International Conference on Information Security (IFIP/SEC)
    • Wimmel, G.1    Wisspeintner, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.