Towards formal analysis of security protocols
- 30 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 147-158
- https://doi.org/10.1109/csfw.1993.246631
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- A logic of knowledge and belief for reasoning about computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Exploring the BAN approach to protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The value of semantics for the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolJournal of Cryptology, 1991
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- On the formal specification and verification of a multiparty session protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Proof Methods for Modal and Intuitionistic LogicsPublished by Springer Nature ,1983
- Modal LogicPublished by Cambridge University Press (CUP) ,1980