Abstracting Cryptographic Protocols with Tree Automata
- 1 October 1999
- book chapter
- Published by Springer Nature
- p. 149-163
- https://doi.org/10.1007/3-540-48294-6_10
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Solving systems of set constraintsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On unifying some cryptographic protocol logicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using CSP to detect errors in the TMN protocolIEEE Transactions on Software Engineering, 1997
- Model Checking for Security Protocols,Published by Defense Technical Information Center (DTIC) ,1997
- The NRL Protocol Analyzer: An OverviewPublished by Defense Technical Information Center (DTIC) ,1994
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Abstract interpretation and application to logic programsThe Journal of Logic Programming, 1992
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989