Computer-Assisted Verification of a Protocol for Certified Email
- 13 May 2003
- book chapter
- Published by Springer Nature
- p. 316-335
- https://doi.org/10.1007/3-540-44898-5_17
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Authenticity by typing for security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Types and effects for asymmetric cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- From Secrecy to Authenticity in Security ProtocolsPublished by Springer Nature ,2002
- Analyzing security protocols with secrecy types and logic programsPublished by Association for Computing Machinery (ACM) ,2002
- Game analysis of abuse-free contract signingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Inductive analysis of the Internet protocol TLSACM Transactions on Information and System Security, 1999
- Analysis of the Internet Key Exchange Protocol Using the NRL Protocol AnalyzerPublished by Defense Technical Information Center (DTIC) ,1999
- Formal analysis of a non-repudiation protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1998
- Kerberos Version IV: Inductive analysis of the secrecy goalsPublished by Springer Nature ,1998