Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
- 1 January 1991
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 3 (2) , 81-98
- https://doi.org/10.1007/bf00196790
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- Security defects in CCITT recommendation X.509ACM SIGCOMM Computer Communication Review, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- An axiomatic basis for computer programmingCommunications of the ACM, 1969