Security architectures using formal methods
- 1 June 1993
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 11 (5) , 694-701
- https://doi.org/10.1109/49.223872
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- A system for the specification and analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Formal Approach to Security ArchitecturesPublished by Springer Nature ,2001
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Hidden assumptions in cryptographic protocolsIEE Proceedings E Computers and Digital Techniques, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978