Exploring the BAN approach to protocol analysis
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- A logic of knowledge and belief for reasoning about computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- On the formal specification and verification of a multiparty session protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryptionIEEE Transactions on Communications, 1989
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- Expert systems applied to the analysis of key management schemesComputers & Security, 1987
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- An axiomatic basis for computer programmingCommunications of the ACM, 1969