Mixed strand spaces
- 20 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Analysis of the Internet Key Exchange protocol using the NRL Protocol AnalyzerPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Honest ideals on strand spacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Strand spaces: why is a security protocol correct?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Two attacks on Neuman—Stubblebine authentication protocolsInformation Processing Letters, 1995
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987