Typing One-to-One and One-to-Many Correspondences in Security Protocols
- 25 June 2003
- book chapter
- Published by Springer Nature
- p. 263-282
- https://doi.org/10.1007/3-540-36532-x_17
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- A formal analysis of ome properties of kerberos 5 using MSRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Cryptographic typesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Typed MSR: Syntax and ExamplesPublished by Springer Nature ,2001
- Secrecy Types for Asymmetric CommunicationPublished by Springer Nature ,2001
- Authentication primitives and their compilationPublished by Association for Computing Machinery (ACM) ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Programming Satan's computerPublished by Springer Nature ,1995
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983