Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
- 25 May 1999
- journal article
- Published by Elsevier in Computer Communications
- Vol. 22 (8) , 697-709
- https://doi.org/10.1016/s0140-3664(99)00030-4
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- A timestamp model for determining real-time communications in intelligent networksComputer Communications, 1997
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- Authentication revisitedACM SIGOPS Operating Systems Review, 1987
- Authentication protocols for computer networks: IComputer Networks and ISDN Systems, 1986
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978