메뉴 건너뛰기




Volumn 1, Issue 3-4, 1992, Pages 317-334

Knowledge, belief, and semantics in the analysis of cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84974755213     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-1992-13-407     Document Type: Article
Times cited : (25)

References (35)
  • 2
    • 0025386404 scopus 로고
    • February, Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
    • Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
    • (1989) A Logic of Authentication. Research Report 39, Digital Systems Researchcenter
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 4
    • 0025641513 scopus 로고
    • A Logic of Communication in Hostile Environment
    • IEEE Computer Society Press, Los Alamitos, California
    • Pierre Bieber. A Logic of Communication in Hostile Environment, In Proc. Computer Security Foundations Workshop 3. IEEE Computer Society Press, Los Alamitos, California, June 1990.
    • (1990) Proc. Computer Security Foundations Workshop , vol.3
    • Bieber, P.1
  • 5
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations and Model, Technical Report M74-244
    • Bedford, MA
    • E. Bell and L. J. La Padula. Secure Computer Systems: Mathematical Foundations and Model, Technical Report M74-244• The MITRE Corporation, Bedford, MA, October 1974.
    • (1974) The MITRE Corporation
    • Bell, E.1    La Padula, L.J.2
  • 7
    • 0022706656 scopus 로고
    • Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications
    • M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications. ACM Transactions on Programming Languages and Systems, 8(2):244-263, April 1986.
    • (1986) ACM Transactions on Programming Languages and Systems , vol.8 , Issue.2 , pp. 244-263
    • Clarke, M.1    Emerson, E.A.2    Sistla, A.P.3
  • 11
  • 12
    • 84860566244 scopus 로고
    • DIM ACS Series in Discrete Mathematics and Theoretical Computer Science, AMS and ACM
    • Joan Feigenbaum and Michael Merritt, editors. Distributed Computing and Cryptography, volume 2 of DIM ACS Series in Discrete Mathematics and Theoretical Computer Science, AMS and ACM, 1991
    • (1991) Editors. Distributed Computing and Cryptography , vol.2
    • Feigenbaum, J.1    Merritt, M.2
  • 14
    • 85028743437 scopus 로고
    • Logics for Cryptographic Protocols - Virtues and Limitations
    • IEEE Computer Society Press, Los Alamitos, California
    • V.D. Gligor, R. Kailar, S. Stubblebine, and L. Gong. Logics for Cryptographic Protocols - Virtues and Limitations. In Proceedings of the Computer Security Foundations Workshop 4, pages 219-226. IEEE Computer Society Press, Los Alamitos, California, 1991.
    • (1991) Proceedings of the Computer Security Foundations Workshop , vol.4 , pp. 219-226
    • Gligor, V.D.1    Kailar, R.2    Stubblebine, S.3    Gong, L.4
  • 16
    • 0025023289 scopus 로고
    • Reasoning about Belief in Cryptographic Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Li Gong, Roger Needham, and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 234-248. IEEE Computer Society Press, Los Alamitos, California, 1990.
    • (1990) Proceedings of the 1990 IEEE Symposium on Security and Privacy , pp. 234-248
    • Li, G.1    Needham, R.2    Yahalom, R.3
  • 17
    • 0026850049 scopus 로고
    • A Logical Approach to Multilevel Security of Probabilistic Systems
    • IEEE Computer Society Press, Los Alamitos, California
    • James W. Gray, and Paul F. Syverson. A Logical Approach to Multilevel Security of Probabilistic Systems. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 164-176. IEEE Computer Society Press, Los Alamitos, California, 1992.
    • (1992) Proceedings of the 1992 IEEE Symposium on Security and Privacy , pp. 164-176
    • Gray, J.W.1    Syverson, P.F.2
  • 20
    • 0025460546 scopus 로고
    • Halpern andYoram Moses. Knowledge and Common Knowledge in a Distributed Environment
    • Joseph Y. Halpern and Yoram Moses. Knowledge and Common Knowledge in a Distributed Environment. JACM, 37(3):549-587, July 1990.
    • (1990) JACM , vol.37 , Issue.3 , pp. 549-587
    • Joseph, Y.1
  • 21
    • 0023248072 scopus 로고
    • Kemmerer. Using Formal Verification Techniques to Analyze Cryptographic Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Richard A. Kemmerer. Using Formal Verification Techniques to Analyze Cryptographic Protocols. In Proceedings of the. 1987 IEEE Symposium on Security and Privacy, pages 134-139. IEEE Computer Society Press, Los Alamitos, California, 1987.
    • (1987) Proceedings of The. 1987 IEEE Symposium on Security and Privacy , pp. 134-139
    • Richard, A.1
  • 22
    • 85068233104 scopus 로고
    • On Belief Evolution in Authentication Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Rajashekar Kailar and Virgil D. Gligor. On Belief Evolution in Authentication Protocols, In Proceedings of the Computer Security Foundations Workshop 4, pages 103-116. IEEE Computer Society Press, Los Alamitos, California, 1991.
    • (1991) Proceedings of the Computer Security Foundations Workshop , vol.4 , pp. 103-116
    • Kailar, R.1    Gligor, V.D.2
  • 23
    • 0040683489 scopus 로고
    • Jonathan Lear, Cambridge University Press, Cambridge
    • Jonathan Lear. Aristotle and Logical Theory. Cambridge University Press, Cambridge, 1980.
    • (1980) Aristotle and Logical Theory
  • 26
    • 84974771580 scopus 로고
    • The Computer Security Foundations Workshop
    • John McLean. The Computer Security Foundations Workshop. IEEE Cipher, pages 15-23, January 1989.
    • (1989) IEEE Cipher , pp. 15-23
    • McLean, J.1
  • 27
    • 0024665570 scopus 로고
    • Using Narrowing in the Analysis of Key Management Protocols. In Proceedings of the, IEEE Computer Society Press, Los Alamitos, California
    • Catherine A. Meadows. Using Narrowing in the Analysis of Key Management Protocols. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 138-147. IEEE Computer Society Press, Los Alamitos, California, 1989.
    • (1989) IEEE Symposium on Security and Privacy , pp. 138-147
    • Meadows, C.A.1
  • 28
    • 84974767090 scopus 로고
    • Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol
    • NRL, September
    • Catherine A. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Formal Report 9265, NRL, September 1990.
    • (1990) Formal Report , vol.9265
    • Catherine, A.1
  • 29
    • 0025599775 scopus 로고
    • Representing Partial Knowledge in an Algebraic Security Model
    • IEEE Computer Society Press, Los Alamitos, California
    • Catherine A. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop 3, pages 23-31. IEEE Computer Society Press, Los Alamitos, California, 1990.
    • (1990) Proceedings of the Computer Security Foundations Workshop , vol.3 , pp. 23-31
    • Meadows, C.A.1
  • 30
    • 0021190844 scopus 로고
    • The INTERROGATOR: A Tool for Cryptographic Protocol Security
    • IEEE Computer Society Press; Los Alamitos, California
    • Jonathan K. Millen. The INTERROGATOR: A Tool for Cryptographic Protocol Security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 138-141. IEEE Computer Society Press; Los Alamitos, California, 1984.
    • (1984) Proceedings of the 1984 IEEE Symposium on Security and Privacy , pp. 138-141
    • Millen, J.K.1
  • 31
    • 0025405980 scopus 로고
    • A Critique of the Burrows, Abadi, and Needham Logic
    • Dan M. Nessett. A Critique of the Burrows, Abadi, and Needham Logic. ACM Operating Systems Review, 24(2):35-38, April 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 33
    • 0026850090 scopus 로고
    • Roles in Cryptographic Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Einar Snekkenes. Roles in Cryptographic Protocols. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 105-119. IEEE Computer Society Press, Los Alamitos, California, 1992.
    • (1992) Proceedings of the 1992 IEEE Symposium on Security and Privacy , pp. 105-119
    • Snekkenes, E.1
  • 34
    • 84974771695 scopus 로고
    • Syverson. A Logic for the Analysis of Cryptographic Protocols
    • NRL, December
    • Paul F. Syverson. A Logic for the Analysis of Cryptographic Protocols. Formal Report 9305, NRL, December 1990.
    • (1990) Formal Report , vol.9305
    • Paul, F.1
  • 35
    • 0026153654 scopus 로고
    • Syverson. The Use of Logic in the Analysis of Cryptographic Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Paul F. Syverson. The Use of Logic in the Analysis of Cryptographic Protocols. In Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 156-170. IEEE Computer Society Press, Los Alamitos, California, 1991.
    • (1991) Proceedings of the 1991 IEEE Symposium on Security and Privacy , pp. 156-170
    • Paul, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.