Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols
- 7 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 950, 64-76
- https://doi.org/10.1109/csfw.2000.856926
Abstract
No abstract availableThis publication has 7 references indexed in Scilit:
- A semantic model for authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A hierarchy of authentication specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Authentication testsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Formal verification of cryptographic protocols: A surveyPublished by Springer Nature ,1995
- Formal requirements for key distribution protocolsPublished by Springer Nature ,1995
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978