A semantic model for authentication protocols
Top Cited Papers
- 31 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 178-194
- https://doi.org/10.1109/risp.1993.287633
Abstract
No abstract availableThis publication has 24 references indexed in Scilit:
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Representing partial knowledge in an algebraic security modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- Authentication in distributed systemsACM SIGOPS Operating Systems Review, 1991
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- WHAT AWARENESS ISN'T: A SENTENTIAL VIEW OF IMPLICIT AND EXPLICIT BELIEFPublished by Elsevier ,1986