메뉴 건너뛰기




Volumn 1853, Issue , 2000, Pages 354-372

Non interference for the analysis of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; NETWORK SECURITY;

EID: 84974597207     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45022-x_31     Document Type: Conference Paper
Times cited : (77)

References (31)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 9
    • 0032659620 scopus 로고    scopus 로고
    • CVS: A compiler for the analysis of cryptographic protocols
    • IEEE press
    • A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of CSFW'99, pages 203-212. IEEE press, 1999.
    • (1999) Proceedings of CSFW'99 , pp. 203-212
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 10
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • September
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), September 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 0033725594 scopus 로고    scopus 로고
    • Information flow analysis in a discrete- time process algebra
    • IEEE Press. To appear
    • R. Focardi, R. Gorrieri, and F. Martinelli. Information flow analysis in a discrete- time process algebra. In Proceedings of CSFW'00, 2000. IEEE Press. To appear.
    • (2000) Proceedings of CSFW'00
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 20
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • LNCS
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 146-166. LNCS 1055, 1996.
    • (1996) Proceedings of TACAS'96 , vol.1055 , pp. 146-166
    • Lowe, G.1
  • 22
    • 84892805082 scopus 로고
    • MasterCard, November, Draft Version 1.2
    • MasterCard. Secure electronic payment protocol, November 1995. Draft Version 1.2.
    • (1995) Secure Electronic Payment Protocol
  • 25
    • 0031633214 scopus 로고    scopus 로고
    • Formal analysis of a non-repudiation protocol
    • IEEE Press
    • S. Schneider. Formal analysis of a non-repudiation protocol. In Proceedings of CSFW'98, pages 54-65. IEEE Press, 1998.
    • (1998) Proceedings of CSFW'98 , pp. 54-65
    • Schneider, S.1
  • 28
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(1):39-51, 1992.
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-51
    • Woo, T.Y.C.1    Lam, S.S.2
  • 29
    • 84923989670 scopus 로고
    • Authentication revised
    • T. Y. C. Woo and S. S. Lam. Authentication revised. IEEE Computer, 25(3):10, 1992.
    • (1992) IEEE Computer , vol.25 , Issue.3 , pp. 10
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.