Symbolic Trace Analysis of Cryptographic Protocols
- 4 July 2001
- book chapter
- Published by Springer Nature
- p. 667-681
- https://doi.org/10.1007/3-540-48224-5_55
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- A calculus of mobile processes, IPublished by Elsevier ,2004
- Towards a completeness result for model checking of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A hierarchy of authentication specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Automatic Verification of Cryptographic Protocols through Compositional Analysis TechniquesPublished by Springer Nature ,1999
- Proof techniques for cryptographic processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security ProtocolsPublished by Springer Nature ,1998
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983