Synthesizing Secure Protocols
- 1 January 2007
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Explicit Randomness is not Necessary when Modeling Probabilistic EncryptionElectronic Notes in Theoretical Computer Science, 2007
- A derivation system and compositional logic for security protocolsJournal of Computer Security, 2005
- Computationally Sound, Automated Proofs for Security ProtocolsPublished by Springer Nature ,2005
- New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic ProtocolsPublished by Springer Nature ,2003
- Verification of Cryptographic Protocols: Tagging Enforces TerminationPublished by Springer Nature ,2003
- Scalable Protocols for Authenticated Group Key ExchangePublished by Springer Nature ,2003
- Secure Implementation of Channel AbstractionsInformation and Computation, 2002
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987