Three systems for cryptographic protocol analysis
- 1 June 1994
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 7 (2) , 79-130
- https://doi.org/10.1007/bf00197942
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- A logic of communication in hostile environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Integrating formal methods into the development processIEEE Software, 1990
- A security scheme for resource sharing over a networkComputers & Security, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Unification in a combination of equational theories: an efficient algorithmPublished by Springer Nature ,1990
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- INATESTACM SIGSOFT Software Engineering Notes, 1985
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981