Protocol interactions and the chosen protocol attack
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 91-104
- https://doi.org/10.1007/bfb0028162
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- SPX: global authentication using public key certificatesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Robustness Principles for Public Key ProtocolsPublished by Springer Nature ,1995
- Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key ManagementPublished by RFC Editor ,1993
- Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related ServicesPublished by RFC Editor ,1993
- Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication ProceduresPublished by RFC Editor ,1993
- Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and IdentifiersPublished by RFC Editor ,1993
- A logic of authenticationACM Transactions on Computer Systems, 1990