Verification of network security protocols
- 31 December 1989
- journal article
- Published by Elsevier in Computers & Security
- Vol. 8 (8) , 693-708
- https://doi.org/10.1016/0167-4048(89)90008-4
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- Authentication protocols for computer networks: IComputer Networks and ISDN Systems, 1986
- Automatic verification of finite-state concurrent systems using temporal logic specificationsACM Transactions on Programming Languages and Systems, 1986
- Hierarchical verification of asynchronous circuits using temporal logicTheoretical Computer Science, 1985
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- General Technique for Communications Protocol ValidationIBM Journal of Research and Development, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978