A formal language for cryptographic protocol requirements
- 1 January 1996
- journal article
- Published by Springer Nature in Designs, Codes and Cryptography
- Vol. 7 (1-2) , 27-59
- https://doi.org/10.1007/bf00125075
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Privacy and authentication for wireless local area networksIEEE Wireless Communications, 1994
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- Rejoinder to NessettACM SIGOPS Operating Systems Review, 1990
- A security scheme for resource sharing over a networkComputers & Security, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976