메뉴 건너뛰기




Volumn 2477, Issue , 2002, Pages 326-341

An improved constraint-based system for the verification of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84958742278     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45789-5_24     Document Type: Conference Paper
Times cited : (54)

References (41)
  • 3
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • L. C. Aiello and F. Massacci. Verifying security protocols as planning in logic programming. Transactions on Computational Logic, 2(4):542-580, 2001.
    • (2001) Transactions on Computational Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.C.1    Massacci, F.2
  • 6
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • In J.-J. Quisquater, editor, Louvain-la-Neuve, Belgium, Springer-Verlag
    • G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, volume 1485 of LNCS, pages 361-375, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
    • (1998) Proc. 5Th European Symposium on Research in Computer Security, Volume 1485 of LNCS , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 9
    • 54249156030 scopus 로고    scopus 로고
    • Ensuring security through model checking in a logical environment (Preliminary results)
    • G. Delzanno, S. Etalle, and M. Gabbrielli, editors
    • M. Bozzano. Ensuring security through model checking in a logical environment (preliminary results). In G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Proc. Workshop on Specification, Analysis and Validation for Emerging Technologies (SAVE01), 2001.
    • (2001) Proc. Workshop on Specification, Analysis and Validation for Emerging Technologies (SAVE01)
    • Bozzano, M.1
  • 24
  • 25
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer-Verlag, Berlin Germany
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 29
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 31
    • 0023295108 scopus 로고
    • The Interrogator: Protocol security analysis
    • February, Special Issue on Computer Security and Privacy
    • J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, February 1987. Special Issue on Computer Security and Privacy.
    • (1987) IEEE Transactions on Software Engineering , vol.13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 34
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 39
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1-2):47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3
  • 40
    • 0002508587 scopus 로고
    • A lesson on authenticated protocol design
    • T.Y.C. Woo and S. S. Lam. A lesson on authenticated protocol design. Operating Systems Review, 28(3):24-37, 1994.
    • (1994) Operating Systems Review , vol.28 , Issue.3 , pp. 24-37
    • Woo, T.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.