An efficient cryptographic protocol verifier based on prolog rules
Top Cited Papers
- 29 August 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10636900,p. 82-96
- https://doi.org/10.1109/csfw.2001.930138
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Specifying Authentication Protocols Using Rewriting and StrategiesPublished by Springer Nature ,2001
- Secrecy and Group CreationPublished by Springer Nature ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security ProtocolsPublished by Springer Nature ,1998
- Explicit communication revisited: two new attacks on authentication protocolsIEEE Transactions on Software Engineering, 1997
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976