Automatic Verification of Time Sensitive Cryptographic Protocols
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Pattern-Based Abstraction for Verifying Secrecy in ProtocolsPublished by Springer Nature ,2003
- A meta-notation for protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- TAPS: a first-order verifier for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Beyond Parameterized VerificationPublished by Springer Nature ,2002
- Analysing Time Dependent Security Properties in CSP Using PVSPublished by Springer Nature ,2000
- Rewriting for Cryptographic Protocol VerificationPublished by Springer Nature ,2000
- Kerberos Version IV: Inductive analysis of the secrecy goalsPublished by Springer Nature ,1998
- Programming Satan's computerPublished by Springer Nature ,1995
- A logic of authenticationACM Transactions on Computer Systems, 1990