Narrowing terminates for encryption
- 23 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Using temporal logic to specify and verify cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Modelling and verifying key-exchange protocols using CSP and FDRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Interrogator modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Proof Theory for General UnificationPublished by Springer Nature ,1991
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989