A Bound on Attacks on Authentication Protocols
- 1 January 2002
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Proving security protocols with model checkers by data independence techniquesJournal of Computer Security, 1999
- Strand spaces: proving security protocols correctJournal of Computer Security, 1999
- Towards a completeness result for model checking of security protocolsJournal of Computer Security, 1999
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978