메뉴 건너뛰기




Volumn 2477, Issue , 2002, Pages 342-359

From secrecy to authenticity in security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84958749546     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45789-5_25     Document Type: Conference Paper
Times cited : (97)

References (28)
  • 3
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 4
    • 84958762859 scopus 로고    scopus 로고
    • The game of the name in cryptographic tables
    • In P. S. Thiagarajan and R. Yap, editors, Phuket, Thailand, Dec, Springer Verlag
    • R. Amadio and S. Prasad. The game of the name in cryptographic tables. In P. S. Thiagarajan and R. Yap, editors, Advances in Computing Science - ASIAN’99, volume 1742 of LNCS, pages 15-27, Phuket, Thailand, Dec. 1999. Springer Verlag.
    • (1999) Advances in Computing Science - ASIAN’99, Volume 1742 of LNCS , pp. 15-27
    • Amadio, R.1    Prasad, S.2
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society. Extended version
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society. Extended version available at http://www.di.ens.fr/˜blanchet/longcsfw14.ps.gz.
    • (2001) 14Th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 11
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A First-Order Verifier for Cryptographic Protocols
    • Cambridge, England, July
    • E. Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. In 13th IEEE Computer Security Foundations Workshop (CSFW-13), pages 144-158, Cambridge, England, July 2000.
    • (2000) 13Th IEEE Computer Security Foundations Workshop (CSFW-13) , pp. 144-158
    • Cohen, E.1
  • 13
    • 0003332235 scopus 로고    scopus 로고
    • A New Algorithm for the Automatic Verification of Authentication Protocols: From Specifications to Flaws and AttackScenarios
    • Rutgers University, New Jersey, Sept
    • M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi. A New Algorithm for the Automatic Verification of Authentication Protocols: From Specifications to Flaws and AttackScenarios. In DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, Sept. 1997.
    • (1997) DIMACS Workshop on Design and Formal Verification of Security Protocols
    • Debbabi, M.1    Mejri, M.2    Tawbi, N.3    Yahmadi, I.4
  • 14
    • 0034835462 scopus 로고    scopus 로고
    • Authenticity by Typing for Security Protocols
    • Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
    • A. Gordon and A. Jeffrey. Authenticity by Typing for Security Protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 145-159, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 145-159
    • Gordon, A.1    Jeffrey, A.2
  • 15
    • 84948759702 scopus 로고    scopus 로고
    • Types and Effects for Asymmetric Cryptographic Protocols
    • Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
    • A. Gordon and A. Jeffrey. Types and Effects for Asymmetric Cryptographic Protocols. In 15th IEEE Computer Security Foundations Workshop (CSFW-15), Cape Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society.
    • (2002) 15Th IEEE Computer Security Foundations Workshop (CSFW-15)
    • Gordon, A.1    Jeffrey, A.2
  • 16
    • 0033683607 scopus 로고    scopus 로고
    • Towards automatic verification of authentication protocols on an unbounded network
    • Cambridge, England, July
    • J. Heather and S. Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th IEEE Computer Security Foundations Workshop (CSFW-13), pages 132-143, Cambridge, England, July 2000.
    • (2000) 13Th IEEE Computer Security Foundations Workshop (CSFW-13) , pp. 132-143
    • Heather, J.1    Schneider, S.2
  • 20
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Dec
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Commun. ACM, 21(12):993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 21
    • 0023247970 scopus 로고
    • Efficient and Timely Mutual Authentication
    • D. Otway and O. Rees. Efficient and Timely Mutual Authentication. Operating Systems Review, 21(1):8-10, 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 22
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 23
    • 0033344294 scopus 로고    scopus 로고
    • Proving Security Protocols with Model Checkers by Data Independence Techniques
    • A. W. Roscoe and P. J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(2-3):147-190, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 24
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A New Efficient Automatic Checker for Security Protocol Analysis
    • Mordano, Italy, June
    • D. X. Song. Athena: a New Efficient Automatic Checker for Security Protocol Analysis. In 12th IEEE Computer Security Foundation Workshop (CSFW-12), Mordano, Italy, June 1999.
    • (1999) 12Th IEEE Computer Security Foundation Workshop (CSFW-12)
    • Song, D.X.1
  • 26
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • Jan
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. Computer, 25(1):39-52, Jan. 1992.
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.1    Lam, S.S.2
  • 28
    • 13644258471 scopus 로고    scopus 로고
    • Authentication for distributed systems
    • In D. Denning and P. Denning, editors, ACM Press and Addison-Wesley, Oct
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. In D. Denning and P. Denning, editors, Internet Besieged: Countering Cyberspace Scofflaws. ACM Press and Addison-Wesley, Oct. 1997.
    • (1997) Internet Besieged: Countering Cyberspace Scofflaws
    • Woo, T.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.