Modelling a public-key infrastructure
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 325-350
- https://doi.org/10.1007/3-540-61770-1_45
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Designing secure communication protocols from trust specificationsAlgorithmica, 1994
- Security architectures using formal methodsIEEE Journal on Selected Areas in Communications, 1993
- A logic for reasoning about securityACM Transactions on Computer Systems, 1992
- An axiomatic theory of trust in secure communication protocolsComputers & Security, 1992
- Authentication in distributed systemsACM SIGOPS Operating Systems Review, 1991
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Probabilistic logicArtificial Intelligence, 1986
- Probability logic.Notre Dame Journal of Formal Logic, 1984
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976