Roles in cryptographic protocols
- 2 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- A logic of knowledge and belief for reasoning about computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A logic of communication in hostile environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Formal semantics for logics of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolJournal of Cryptology, 1991
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- The Prisoners’ Problem and the Subliminal ChannelPublished by Springer Nature ,1984
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978