Finite-state analysis of security protocols
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Protocol verification as a hardware design aidPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Modelling and verifying key-exchange protocols using CSP and FDRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Security properties and CSPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1996
- Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two ApproachesPublished by Defense Technical Information Center (DTIC) ,1996
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981