메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 63-137

The logic of authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84962060059     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_2     Document Type: Conference Paper
Times cited : (109)

References (122)
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • An extended version of this paper appears as Research Report 149, Digital Equipment Corporation Systems Research Center, January 1998. An early presentation appears in [AG97]. 113
    • [AG99] Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 143:1–70, 1999. An extended version of this paper appears as Research Report 149, Digital Equipment Corporation Systems Research Center, January 1998. An early presentation appears in [AG97]. 113
    • (1999) Information and Computation , vol.143 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84957714601 scopus 로고    scopus 로고
    • D. Coppersmith, editor, Advances in Cryptology — CRYPTO ’95, Springer-Verlag, LNCS 963, August 1995. 107, 109
    • [AN95] Ross Anderson and Roger Needham. Robustness principles for public key protocols. In D. Coppersmith, editor, Advances in Cryptology — CRYPTO ’95, pages 236–247. Springer-Verlag, LNCS 963, August 1995. 107, 109
    • Robustness Principles for Public Key Protocols , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 6
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practices for cryptographic protocols
    • January 1996. A preliminary version appeared as [AN94]. 106
    • [AN96] Martín Abadi and Roger Needham. Prudent engineering practices for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, January 1996. A preliminary version appeared as [AN94]. 106
    • IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 7
    • 85045348668 scopus 로고    scopus 로고
    • [Ano] The anonymizer. http://www.anonymizer.com/.128
  • 8
    • 35048895107 scopus 로고    scopus 로고
    • Reconciling two views of cryptographic protocols (The compuational soundness of formal encryption
    • Springer-Verlag, LNCS
    • [AR00] Martín Abadi and Phillip Rogaway. Reconciling two views of cryptographic protocols (the compuational soundness of formal encryption. In IFIP International Conference on Theoretical Computer Science (IFIP TCS2000). Springer-Verlag, LNCS, 2000. 128
    • (2000) IFIP International Conference on Theoretical Computer Science (IFIP TCS2000) , pp. 128
    • Abadi, M.1    Rogaway, P.2
  • 11
    • 0004019982 scopus 로고    scopus 로고
    • Authentication: A practical study of belief in action
    • Morgan Kaufmann, March 1988. Also presented at The Computer Security Foundations Workshop, Franconia, NH, June 1988. 66
    • [BAN88] Michael Burrows, Martín Abadi, and Roger Needham. Authentication: A practical study of belief in action. In M. Vardi, editor, Proceedings of the Second Conference on Theoretical Aspects of Reasoning About Knowledge (Tark), pages 325–342. Morgan Kaufmann, March 1988. Also presented at The Computer Security Foundations Workshop, Franconia, NH, June 1988. 66
    • Proceedings of the Second Conference on Theoretical Aspects of Reasoning about Knowledge , pp. 325-342
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 12
    • 0004215976 scopus 로고    scopus 로고
    • Research Report 39, Digital Systems Research Center, February 1989. Revised Feb. 22, 1990. 63, 66, 67, 68, 69, 70, 85, 87, 93, 95, 98, 101, 102
    • [BAN89a] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Research Report 39, Digital Systems Research Center, February 1989. Revised Feb. 22, 1990. 63, 66, 67, 68, 69, 70, 85, 87, 93, 95, 98, 101, 102
    • A Logic of Authentication
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 14
    • 85045306090 scopus 로고    scopus 로고
    • December 1989. This issue of OSR: Proceedings of the Twelfth ACM Symposium on Operating Systems Principles (SOSP), Litchfield Park, Arizona, December 1989. 66
    • December 1989. This issue of OSR: Proceedings of the Twelfth ACM Symposium on Operating Systems Principles (SOSP), Litchfield Park, Arizona, December 1989. 66
  • 15
    • 0000523051 scopus 로고    scopus 로고
    • A logic of authentication. Proceedings of the Royal Society of London
    • December 1989. 66
    • [BAN89c] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences, 426(1871):233–271, December 1989. 66
    • Series A, Mathematical and Physical Sciences , vol.426 , Issue.1871 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 18
    • 84948705711 scopus 로고    scopus 로고
    • The scope of a logic of authentication
    • Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, AMS and ACM, 1990. Proceedings of a DIMACS workshop, October 1989. 66
    • [BAN90c] Michael Burrows, Martín Abadi, and Roger Needham. The scope of a logic of authentication. In J. Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, volume 2 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pages 119–126. AMS and ACM, 1990. Proceedings of a DIMACS workshop, October 1989. 66
    • DIMACS Series in Discrete Mathematics and Theoretical Computer Science , vol.2 , pp. 119-126
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 19
    • 0025641513 scopus 로고    scopus 로고
    • A logic of communication in hostile environment
    • IEEE CS Press, June 1990. 97, 98
    • [Bie90] Pierre Bieber. A logic of communication in hostile environment. In Proceedings of the Computer Security Foundations Workshop III, pages 14–22. IEEE CS Press, June 1990. 97, 98
    • Proceedings of the Computer Security Foundations Workshop III , pp. 14-22
    • Bieber, P.1
  • 21
    • 0027741529 scopus 로고    scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • ACM Press, November 1993. 108
    • [BM93] Steve Bellovin and Michael Merritt. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 244–250. ACM Press, November 1993. 108
    • Proceedings of the 1St ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 22
    • 84944035753 scopus 로고    scopus 로고
    • F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, Springer-Verlag, LNCS 1895, October 2000. 127
    • [BMPT00] Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, and Piero Tramon-tano. Formal verification of cardholder registration in SET. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, pages 159–174. Springer-Verlag, LNCS 1895, October 2000. 127
    • Formal Verification of Cardholder Registration in SET , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramon-Tano, P.4
  • 23
    • 0029718781 scopus 로고    scopus 로고
    • A HOL extension of GNY for automatically analyzing cryptographic protocols
    • IEEE CS Press, June 1996. 112
    • [Bra96] Stephen H. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In 9th IEEE Computer Security Foundations Workshop, pages 62–76. IEEE CS Press, June 1996. 112
    • 9Th IEEE Computer Security Foundations Workshop , pp. 62-76
    • Brackin, S.H.1
  • 24
    • 19144371730 scopus 로고    scopus 로고
    • Automatic formal analyses of two large commercial protocols
    • September 1997. Available at
    • [Bra97] Stephen H. Brackin. Automatic formal analyses of two large commercial protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997. Available at http://dimacs.rutgers.edu/Workshops/Security/program2/brackin.html. 112, 127
    • DIMACS Workshop on Design and Formal Verification of Security Protocols , pp. 112
    • Brackin, S.H.1
  • 25
    • 0031629945 scopus 로고    scopus 로고
    • Evaluating and improving protocol analysis by automatic proof
    • IEEE CS Press, 1998. 112
    • [Bra98] Stephen H. Brackin. Evaluating and improving protocol analysis by automatic proof. In 11th IEEE Computer Security Foundations Workshop, pages 138– 152. IEEE CS Press, 1998. 112
    • 11Th IEEE Computer Security Foundations Workshop , pp. 138-152
    • Brackin, S.H.1
  • 30
  • 33
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. L. Rivest, and A. T. Sherman, editors
    • [Cha83] David Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology – Proceedings of Crypto 82, pages 199–203, 1983. 107
    • (1983) Advances in Cryptology – Proceedings of Crypto 82 , vol.107 , pp. 199-203
    • Chaum, D.1
  • 34
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and receiver untraceability
    • [Cha88] David Chaum. The dining cryptographers problem: Unconditional sender and receiver untraceability. Journal of Cryptology, 1(1):65–75, 1988. 128
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 36
    • 0003568551 scopus 로고    scopus 로고
    • Version 1.0, nov 1997. Available at, under the link “Security Protocols Review”. 87, 93, 102, 103, 112
    • [CJ97] John Clark and Jeremy Jacob. A survey of authentication protocol literature: Version 1.0, nov 1997. Available at www-users.cs.york.ac.uk/~jac/ under the link “Security Protocols Review”. 87, 93, 102, 103, 112
    • A Survey of Authentication Protocol Literature
    • Clark, J.1    Jacob, J.2
  • 37
    • 0033701785 scopus 로고    scopus 로고
    • Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
    • IEEE CS Press, May 2000. 113
    • [CJ00] John Clark and Jeremy Jacob. Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 82–95. IEEE CS Press, May 2000. 113
    • Proceedings of the IEEE Symposium on Security and Privacy , pp. 82-95
    • Clark, J.1    Jacob, J.2
  • 38
  • 39
    • 85045306936 scopus 로고    scopus 로고
    • Crowds. http://www.research.att.com/projects/crowds/. 128
    • Crowds1
  • 40
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • B. Kaliski, editor, Springer-Verlag, LNCS 1294, 1997. 126
    • [CS97] Jan L. Camenisch and Markus A. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology – CRYPTO ’97, pages 410–424. Springer-Verlag, LNCS 1294, 1997. 126
    • Advances in Cryptology – CRYPTO ’97 , pp. 410-424
    • Camenisch, J.L.1    Stadler, M.A.2
  • 41
    • 85024290278 scopus 로고    scopus 로고
    • D. W. Davies, editor, Springer-Verlag, LNCS 547, 1991. 126
    • [CvH91] David Chaum and Eugène van Heyst. Group signature. In D. W. Davies, editor, Advances in Cryptology – EUROCRYPT ’91, pages 257–265. Springer-Verlag, LNCS 547, 1991. 126
    • Group Signature , vol.91 , pp. 257-265
    • Chaum, D.1    Vanheyst, E.2
  • 42
    • 0033719708 scopus 로고    scopus 로고
    • C3po: A tool for automatic sound cryptographic protocol analysis
    • IEEE CS Press, June 2000. 83, 113
    • [Dek00] Anthony H. Dekker. C3po: a tool for automatic sound cryptographic protocol analysis. In 13th IEEE Computer Security Foundations Workshop, pages 77– 87. IEEE CS Press, June 2000. 83, 113
    • 13Th IEEE Computer Security Foundations Workshop , pp. 77-87
    • Dekker, A.H.1
  • 45
    • 84976665942 scopus 로고    scopus 로고
    • Timestamps in key distribution protocols
    • August 1981. 73, 92
    • [DS81] Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533–536, August 1981. 73, 92
    • Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 47
    • 0020720357 scopus 로고    scopus 로고
    • On the security of public-key protocols
    • March 1983. 64, 123
    • [DY83] Danny Dolev and Andrew C. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 2(29):198–208, March 1983. 64, 123
    • IEEE Transactions on Information Theory , vol.2 , Issue.29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 48
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in CSP using PVS
    • F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Springer-Verlag, LNCS 1895, October
    • [ES00] Neil Evans and Steve Schneider. Analysing time dependent security properties in CSP using PVS. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, pages 222–237. Springer-Verlag, LNCS 1895, October 2000. 103
    • (2000) Computer Security – ESORICS 2000 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 50
    • 85045328839 scopus 로고    scopus 로고
    • [Fre] Freedom. http://www.freedom.net/. 128
    • Freedom , pp. 128
  • 54
    • 19144370194 scopus 로고    scopus 로고
    • On the verification of cryptographic protocols - a tale of two committees
    • Steve Schneider and Peter Ryan, editors, Elsevier Science Publishers
    • [Gol00] Dieter Gollmann. On the verification of cryptographic protocols - a tale of two committees. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers, 2000. 102, 105
    • (2000) Electronic Notes in Theoretical Computer Science , vol.32 , pp. 105
    • Gollmann, D.1
  • 55
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, IEEE Computer Society Press, 1998. 109
    • [GS98] Li Gong and Paul Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79–100. IEEE Computer Society Press, 1998. 109
    • Dependable Computing for Critical Applications , vol.5 , pp. 79-100
    • Li, G.1    Syverson, P.2
  • 57
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • January 1996. 127
    • [HT96] N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16–30, January 1996. 127
    • IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 59
    • 0029210095 scopus 로고    scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • IEEE CS Press, May 1995. 127
    • [Kai95] Rajashekar Kailar. Reasoning about accountability in protocols for electronic commerce. In Proceedings of the IEEE Symposium on Security and Privacy, pages 236–250. IEEE CS Press, May 1995. 127
    • Proceedings of the IEEE Symposium on Security and Privacy , pp. 236-250
    • Kailar, R.1
  • 60
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • [Kai96] Rajashekar Kailar. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 5(22), May 1996. 127
    • (1996) IEEE Transactions on Software Engineering , vol.5 , Issue.22 , pp. 127
    • Kailar, R.1
  • 61
    • 0023248072 scopus 로고    scopus 로고
    • Using formal verification techniques to analyze cryptographic protocols
    • IEEE CS Press, May 1987. 63
    • [Kem87] Richard A. Kemmerer. Using formal verification techniques to analyze cryptographic protocols. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 134–139. IEEE CS Press, May 1987. 63
    • Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 134-139
    • Kemmerer, R.A.1
  • 62
    • 84958771467 scopus 로고    scopus 로고
    • A sound logic for analysing electronic commerce protocols
    • J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Springer-Verlag, LNCS 1485, September 1998. 127
    • [KN98] Volker Kessler and Heike Neumann. A sound logic for analysing electronic commerce protocols. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Computer Security – ESORICS 98, pages 345–360. Springer-Verlag, LNCS 1485, September 1998. 127
    • Computer Security – ESORICS , vol.98 , pp. 345-360
    • Kessler, V.1    Neumann, H.2
  • 63
    • 33646783922 scopus 로고    scopus 로고
    • A game approach to the verification of exchange protocols: Application to non-repudiation protocols
    • P. Degano, editor, July 2000. 127
    • [KR00] Steve Kremer and Jean-François Raskin. A game approach to the verification of exchange protocols: Application to non-repudiation protocols. In P. Degano, editor, First Workshop on Issues in the Theory of Security – WITS’00, pages 93–98, July 2000. 127
    • First Workshop on Issues in the Theory of Security – WITS’00 , pp. 93-98
    • Kremer, S.1    Raskin, J.-F.2
  • 64
    • 0017996760 scopus 로고    scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • July 1978. 109
    • [Lam78] Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558–565, July 1978. 109
    • Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 66
    • 0030708255 scopus 로고    scopus 로고
    • A herarchy of authentication specifications
    • IEEE Computer Society Press, June 1997. 100, 101, 102, 103
    • [Low97] Gavin Lowe. A herarchy of authentication specifications. In Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW9), pages 31–43. IEEE Computer Society Press, June 1997. 100, 101, 102, 103
    • Proceedings of the 10Th IEEE Computer Security Foundations Workshop (CSFW9) , pp. 31-43
    • Lowe, G.1
  • 68
    • 85063350588 scopus 로고    scopus 로고
    • A model of computation for the NRL Protocol Analyzer
    • IEEE CS Press, June 1994. 114, 116, 118
    • [Mea94] Catherine Meadows. A model of computation for the NRL Protocol Analyzer. In Proceedings of the 7th Computer Security Foundations Workshop, pages 84–89. IEEE CS Press, June 1994. 114, 116, 118
    • Proceedings of the 7Th Computer Security Foundations Workshop , pp. 84-89
    • Meadows, C.1
  • 69
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An overview
    • February 1996. 114, 116
    • [Mea96] Catherine Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113–131, February 1996. 114, 116
    • Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 70
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
    • IEEE Computer Society Press, May 1999. 128
    • [Mea99a] C. Meadows. Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999. 128
    • Proceedings of the IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 72
    • 0012795935 scopus 로고    scopus 로고
    • Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
    • P. Degano, editor, July 2000. 126
    • [Mea00a] Catherine Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In P. Degano, editor, First Workshop on Issues in the Theory of Security – WITS’00, pages 87–92, July 2000. 126
    • First Workshop on Issues in the Theory of Security – WITS’00 , pp. 87-92
    • Meadows, C.1
  • 73
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • IEEE Computer Society Press, January 2000. 125
    • [Mea00b] Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, volume I, pages 237–250. IEEE Computer Society Press, January 2000. 125
    • DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition , vol.1 , pp. 237-250
    • Meadows, C.1
  • 74
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • Forthcoming. A preliminary version of portions of this work appeared in [Mea99b]. 126
    • [Mea01] Catherine Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 2001. Forthcoming. A preliminary version of portions of this work appeared in [Mea99b]. 126
    • (2001) Journal of Computer Security
    • Meadows, C.1
  • 77
    • 0021190844 scopus 로고    scopus 로고
    • The Interrogator: A tool for cryptographic protocol security
    • Oakland, CA, April 1984. IEEE Computer Society Press. 63
    • [Mil84] Jonathan K. Millen. The Interrogator: A tool for cryptographic protocol security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 134–141, Oakland, CA, April 1984. IEEE Computer Society Press. 63
    • Proceedings of the 1984 IEEE Symposium on Security and Privacy , pp. 134-141
    • Millen, J.K.1
  • 82
    • 0025405980 scopus 로고    scopus 로고
    • A critique of the burrows, abadi, and needham logic
    • April 1990. 73, 74
    • [Nes90] D. M. Nessett. A critique of the burrows, abadi, and needham logic. Operating Systems Review, 24(2):35–38, April 1990. 73, 74
    • Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 83
    • 0018048246 scopus 로고    scopus 로고
    • Using encryption for authentication in large networks of computers
    • 1978. 65, 101, 102
    • [NS78] R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993–999, 1978. 65, 101, 102
    • Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 85
    • 84890935025 scopus 로고    scopus 로고
    • [Oni] Onion routing. http://www.onion-router.net/. 128
    • Onion Routing
  • 87
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert — extending automatic protocol generation to three-party authentication and key agreement
    • IEEE CS Press, June 2000. 113
    • [PS00] Adrian Perrig and Dawn Song. Looking for diamonds in the desert — extending automatic protocol generation to three-party authentication and key agreement. In 13th IEEE Computer Security Foundations Workshop, pages 64–76. IEEE CS Press, June 2000. 113
    • 13Th IEEE Computer Security Foundations Workshop , pp. 64-76
    • Perrig, A.1    Song, D.2
  • 89
    • 0024714097 scopus 로고    scopus 로고
    • Integrating security in a large distributed system
    • August 1989. 102
    • [Sat89] M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 15(3):247–280, August 1989. 102
    • ACM Transactions on Computer Systems , vol.15 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 93
    • 1442341305 scopus 로고    scopus 로고
    • Formal requirements for key distribution protocols
    • A. De Santis, editor, Springer-Verlag, LNCS 950, 1994. 117
    • [SM94] P. Syverson and C. Meadows. Formal requirements for key distribution protocols. In A. De Santis, editor, Advances in Cryptology — EUROCRYPT ’94, pages 32–331. Springer-Verlag, LNCS 950, 1994. 117
    • Advances in Cryptology — EUROCRYPT , vol.94 , pp. 32-331
    • Syverson, P.1    Meadows, C.2
  • 94
    • 0001937830 scopus 로고    scopus 로고
    • A formal language for cryptographic protocol requirements
    • January 1996. 114, 116, 117
    • [SM96] P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1 and 2):27–59, January 1996. 114, 116, 117
    • Designs, Codes, and Cryptography , vol.7 , Issue.1-2 , pp. 27-59
    • Syverson, P.1    Meadows, C.2
  • 97
    • 0032678887 scopus 로고    scopus 로고
    • Thena: A new efficient automatic checker for security protocol analysis
    • Mordano, Italy, June 1999. IEEE Computer Society Press. 118
    • [Son99] Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192–202, Mordano, Italy, June 1999. IEEE Computer Society Press. 118
    • Proceedings of the Twelth IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1
  • 98
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivio, editors, Springer Verlag, LNCS 1146, 1996. 129
    • [SS96] Steve Schneider and Abraham Sidiropoulos. CSP and anonymity. In E. Bertino, H. Kurth, G. Martella, and E. Montolivio, editors, Computer Security – ESORICS 96, pages 198–218. Springer Verlag, LNCS 1146, 1996. 129
    • Computer Security – ESORICS 96 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 99
    • 84924758404 scopus 로고    scopus 로고
    • J. M. Wing, J. Woodcock, and J. Davies, editors, FM’99 – Formal Methods, Springer-Verlag, LNCS 1708, 1999. 128, 129
    • [SS99] Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In J. M. Wing, J. Woodcock, and J. Davies, editors, FM’99 – Formal Methods, Vol. I, pages 814–833. Springer-Verlag, LNCS 1708, 1999. 128, 129
    • Group Principals and the Formalization of Anonymity , vol.1 , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 102
    • 0003527653 scopus 로고    scopus 로고
    • NRL Publication 5540-227, Naval Research Lab, 1996. 77, 78, 79, 84, 85, 88, 95, 98, 120, 124, 125, 126
    • [SvO96] Paul F. Syverson and Paul C. van Oorschot. A unified cryptographic protocol logic. NRL Publication 5540-227, Naval Research Lab, 1996. 77, 78, 79, 84, 85, 88, 95, 98, 120, 124, 125, 126
    • A Unified Cryptographic Protocol Logic
    • Syverson, P.F.1    Vanoorschot, P.C.2
  • 103
    • 0029711077 scopus 로고    scopus 로고
    • An authentication logic supporting synchronization, revocation, and recency
    • ACM Press, March 1996. 127
    • [SW96] Stuart Stubblebine and Rebecca Wright. An authentication logic supporting synchronization, revocation, and recency. In 3rd ACM Conference on Computer and Communications Security (CCS’96), pages 95–105. ACM Press, March 1996. 127
    • 3Rd ACM Conference on Computer and Communications Security (CCS’96) , pp. 95-105
  • 105
    • 84974755213 scopus 로고    scopus 로고
    • Knowledge, belief, and semantics in the analysis of cryptographic protocols
    • [Syv92] Paul F. Syverson. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1(3,4):317–334, 1992. 76, 79
    • Journal of Computer Security , vol.1 , Issue.3-4 , pp. 317-334
    • Syverson, P.F.1
  • 107
    • 0002796093 scopus 로고    scopus 로고
    • On Key Distribution Protocols for Repeated Authentication
    • October 1993. 93
    • [Syv93b] Paul F. Syverson. On Key Distribution Protocols for Repeated Authentication. Operating Systems Review, 27(4):24–30, October 1993. 93
    • Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.F.1
  • 109
    • 0029721958 scopus 로고    scopus 로고
    • Limitations on design principles for public key protocols
    • IEEE Computer Society Press, May 1996. 107, 108
    • [Syv96] Paul Syverson. Limitations on design principles for public key protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 62–72. IEEE Computer Society Press, May 1996. 107, 108
    • Proceedings of the IEEE Symposium on Security and Privacy , pp. 62-72
    • Syverson, P.1
  • 110
    • 85045348482 scopus 로고    scopus 로고
    • Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, June 1998
    • [Syv98] Paul F. Syverson. Relating two models of computation for security protocols. In Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, June 1998. Available at http://www.cs.bell-labs.com/who/nch/fmsp/program.html. 118
    • Relating Two Models of Computation for Security Protocols , pp. 118
    • Syverson, P.F.1
  • 111
    • 0003277548 scopus 로고    scopus 로고
    • Towards a strand semantics for authentication logic
    • Proceedings of MFPS XV (S. Brookes, A. Jung, M. Mislove and A. Scedrov, eds.), New Orleans, LA, April 1999. 114, 118
    • [Syv00] Paul F. Syverson. Towards a strand semantics for authentication logic. Electronic Notes in Theoretical Computer Science, 20, 2000. Proceedings of MFPS XV (S. Brookes, A. Jung, M. Mislove and A. Scedrov, eds.), New Orleans, LA, April 1999. 114, 118
    • (2000) Electronic Notes in Theoretical Computer Science , vol.20
    • Syverson, P.F.1
  • 117
    • 0003537268 scopus 로고    scopus 로고
    • Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, editors, Computer Security – ESORICS 92, Springer-Verlag, LNCS 648, November 1992. 108
    • [Tou92] Marie-Jeanne Toussaint. Separating the specification and implementation phases in cryptology. In Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, editors, Computer Security – ESORICS 92, pages 77–102. Springer-Verlag, LNCS 648, November 1992. 108
    • Separating the Specification and Implementation Phases in Cryptology , pp. 77-102
    • Toussaint, M.-J.1
  • 119
    • 0027735231 scopus 로고    scopus 로고
    • Extending cryptographic logics of belief to key agreement protocols
    • ACM Press, November 1993. 67, 76, 85, 88, 95, 98, 126
    • [vO93] Paul C. van Oorschot. Extending cryptographic logics of belief to key agreement protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 233–243. ACM Press, November 1993. 67, 76, 85, 88, 95, 98, 126
    • Proceedings of the 1St ACM Conference on Computer and Communications Security , pp. 233-243
    • Oorschot, P.C.V.1
  • 120
    • 84949768259 scopus 로고    scopus 로고
    • Formal semantics for authentication logics
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Springer-Verlag, LNCS 1146, September 1996. 78, 83, 113, 127
    • [WK96] Gabriele Wedel and Volker Kessler. Formal semantics for authentication logics. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Computer Security – ESORICS 96, pages 219–241. Springer-Verlag, LNCS 1146, September 1996. 78, 83, 113, 127
    • Computer Security – ESORICS , vol.96 , pp. 219-241
    • Wedel, G.1    Kessler, V.2
  • 121
    • 84974746841 scopus 로고    scopus 로고
    • Optimality of asynchronous two-party secure data-exchange protocol
    • [Yah93] Raphael Yahalom. Optimality of asynchronous two-party secure data-exchange protocol. Journal of Computer Security, 2(2–3):191–209, 1993. 93
    • Journal of Computer Security , vol.2 , Issue.2-3 , pp. 191-209
    • Yahalom, R.1
  • 122
    • 0039311188 scopus 로고    scopus 로고
    • Towards verification of non-repudiation protocols
    • T. Vickers J. Grundy, M. Schwenke, editor, Springer-Verlag, 1998. 127
    • [ZG98] Jianying Zhou and Dieter Gollmann. Towards verification of non-repudiation protocols. In T. Vickers J. Grundy, M. Schwenke, editor, International Refinement Workshop and Formal Methods Pacific 1998, pages 370–380. Springer-Verlag, 1998. 127
    • International Refinement Workshop and Formal Methods Pacific 1998 , pp. 370-380
    • Zhou, J.1    Gollmann, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.