Reasoning about cryptographic protocols in the spi calculus
- 1 January 1997
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Using temporal logic to specify and verify cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Testing Equivalence for Mobile ProcessesInformation and Computation, 1995
- Authentication in distributed systemsACM SIGOPS Operating Systems Review, 1993
- The chemical abstract machineTheoretical Computer Science, 1992
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- Testing equivalences for processesTheoretical Computer Science, 1984