Formal verification of cryptographic protocols: A survey
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 133-150
- https://doi.org/10.1007/bfb0000430
Abstract
No abstract availableKeywords
This publication has 41 references indexed in Scilit:
- Generating formal cryptographic protocol specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logic of communication in hostile environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Privacy and authentication for wireless local area networksIEEE Wireless Communications, 1994
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Rejoinder to NessettACM SIGOPS Operating Systems Review, 1990
- A security scheme for resource sharing over a networkComputers & Security, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- On the security of ping-pong protocolsInformation and Control, 1982