The Game of the Name in Cryptographic Tables
- 19 November 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A bisimulation method for cryptographic protocolsPublished by Springer Nature ,1998
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983