On a Limitation of BAN Logic
- 13 July 2001
- book chapter
- Published by Springer Nature
- p. 240-247
- https://doi.org/10.1007/3-540-48285-7_20
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Towards formal analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A formal framework for authenticationPublished by Springer Nature ,1992
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987