Just Fast Keying in the Pi Calculus
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A derivation system for security protocols and its logical formalizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Hiding Names: Private Authentication in the Applied Pi CalculusPublished by Springer Nature ,2003
- Computer-Assisted Verification of a Protocol for Certified EmailPublished by Springer Nature ,2003
- Efficient, DoS-resistant, secure key exchange for internet protocolsPublished by Association for Computing Machinery (ACM) ,2002
- From Secrecy to Authenticity in Security ProtocolsPublished by Springer Nature ,2002
- Analyzing security protocols with secrecy types and logic programsPublished by Association for Computing Machinery (ACM) ,2002
- Mobile values, new names, and secure communicationPublished by Association for Computing Machinery (ACM) ,2001
- A probabilistic poly-time framework for protocol analysisPublished by Association for Computing Machinery (ACM) ,1998
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994