Deciding cryptographic protocol adequacy with HOL
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 2 references indexed in Scilit:
- Handling infeasible specifications of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978