메뉴 건너뛰기




Volumn 1243, Issue , 1997, Pages 59-73

Reasoning about cryptographic protocols in the spi calculus

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84957872542     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-63141-0_5     Document Type: Conference Paper
Times cited : (46)

References (21)
  • 3
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 January , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 4
    • 0000523051 scopus 로고
    • A logic of authentication
    • 39, February
    • M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
    • (1989) Proceedings of the Royal Society of London A , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.M.3
  • 5
    • 0027113388 scopus 로고
    • The chemical abstract machine
    • April
    • G. Berry and G. Boudol. The chemical abstract machine. Theoretical Computer Science, 96(1):217-248, April 1992.
    • (1992) Theoretical Computer Science , vol.96 , Issue.1 , pp. 217-248
    • Berry, G.1    Boudol, G.2
  • 6
    • 0000036723 scopus 로고
    • Testing equivalence for mobile processes
    • August
    • M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279-303, August 1995.
    • (1995) Information and Computation , vol.120 , Issue.2 , pp. 279-303
    • Boreale, M.1    De Nicola, R.2
  • 7
    • 84957926064 scopus 로고
    • Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC
    • Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January 1977.
    • (1977) , vol.January
  • 11
    • 0042664779 scopus 로고
    • Authentication in distributed systems: A bibliography
    • A. Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31-41, 1993.
    • (1993) ACM Operating Systems Review , vol.27 , Issue.4 , pp. 31-41
    • Liebl, A.1
  • 12
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Lecture Notes in Computer Science, Springer Verlag
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 5-36
    • Meadows, C.1
  • 18
    • 84957926065 scopus 로고
    • Undergraduate lecture notes, Cambridge University
    • R. Milner. The 7r-calculus. Undergraduate lecture notes, Cambridge University, 1995.
    • (1995) The 7R-Calculus
    • Milner, R.1
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.