A logic of communication in hostile environment
- 4 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An axiomatic basis of trust in distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- Knowledge and common knowledge in a distributed environmentPublished by Association for Computing Machinery (ACM) ,1984
- Cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1982
- On the security of public key protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978