Pattern-Based Abstraction for Verifying Secrecy in Protocols
- 28 February 2003
- book chapter
- Published by Springer Nature
- p. 299-314
- https://doi.org/10.1007/3-540-36577-x_22
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Authenticity by typing for security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Tree Automata with One Memory, Set Constraints, and Ping-Pong ProtocolsPublished by Springer Nature ,2001
- Secrecy Types for Asymmetric CommunicationPublished by Springer Nature ,2001
- On the Reachability Problem in Cryptographic ProtocolsPublished by Springer Nature ,2000
- LATIN 2000: Theoretical InformaticsPublished by Springer Nature ,2000
- Secrecy by typing in security protocolsPublished by Springer Nature ,1997
- An approach to the formal verification of cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1996
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- On the security of ping-pong protocolsInformation and Control, 1982