메뉴 건너뛰기




Volumn , Issue , 1999, Pages 64-73

CAPSL interface for the NRL Protocol Analyzer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; FORMAL METHODS; HIGH LEVEL LANGUAGES; SOFTWARE ENGINEERING; SPECIFICATION LANGUAGES; TRANSLATION (LANGUAGES);

EID: 85025425124     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASSET.1999.756753     Document Type: Conference Paper
Times cited : (18)

References (21)
  • 2
    • 0030679458 scopus 로고    scopus 로고
    • An interface specification language for automatically analyzing cryptographic protocols
    • S. Brackin. An interface specification language for automatically analyzing cryptographic protocols. In Symposium on Network and Distributed System Security, 1997.
    • (1997) Symposium on Network and Distributed System Security
    • Brackin, S.1
  • 3
    • 85031624672 scopus 로고    scopus 로고
    • A state-based HOL theory of protocol failure
    • Inc., Ithaca, NY, October
    • S. Brackin. A state-based HOL theory of protocol failure. Technical Report 98007, Arca Systems, Inc., Ithaca, NY, October 1997.
    • (1997) Technical Report 98007, Arca Systems
    • Brackin, S.1
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao. On the Security of Public Key Protocols. IEEE Transactions on Informa-tion Theory, 29(2):198-208, March 1983.
    • (1983) IEEE Transactions on Informa-tion Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 8
    • 0032623470 scopus 로고    scopus 로고
    • Security Protocols over open networks and distributed systems: Formal methods for their analysis
    • to appear. Currently
    • S. Gritzalis, D. Spinellis, and P. Georgiadis. Security Protocols over open networks and distributed systems: Formal methods for their analysis, design and verification, Computer Communications, 1999, to appear. Currently available at http://kerkis.math.aegean.gr/~dspin/pubs/jrnl/1997-CompComm-Formal/html/formal.htm.
    • (1999) Design and Verification, Computer Communications
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 9
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Richard Kemmerer, Catherine Meadows, and Jonathan Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 3(2), 1994.
    • (1994) Journal of Cryptology , vol.3 , Issue.2
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 11
    • 0030084918 scopus 로고    scopus 로고
    • The nrl protocol analyzer: An overview
    • February
    • Catherine Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Program-ming, 26(2):113-131, February 1996.
    • (1996) Journal of Logic Program-ming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 18
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. Cliford Newman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Cliford Newman, B.1    Ts'O, T.2
  • 19
    • 0023247970 scopus 로고
    • Eficient and timely authentication
    • David Otway and Owen Rees. Eficient and timely authentication. Operating Systems Re-view, 21(1):8-10, 1987.
    • (1987) Operating Systems Re-view , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1):85-128, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 21
    • 85037030730 scopus 로고    scopus 로고
    • The SSL protocol., March
    • The SSL protocol. http://home.netscape.com /newsref/std/SSL.html, March 1996.
    • (1996)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.