The NRL Protocol Analyzer: An Overview
- 29 February 1996
- journal article
- Published by Elsevier in The Journal of Logic Programming
- Vol. 26 (2) , 113-131
- https://doi.org/10.1016/0743-1066(95)00095-x
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- A formal language for cryptographic protocol requirementsDesigns, Codes and Cryptography, 1996
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- A security scheme for resource sharing over a networkComputers & Security, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- On the security of ping-pong protocolsInformation and Control, 1982
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- New directions in cryptographyIEEE Transactions on Information Theory, 1976