Proving secrecy is easy enough
- 29 August 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Decision procedures for the analysis of cryptographic protocols by logics of beliefPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A meta-notation for protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Honest ideals on strand spacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Intrusion-tolerant group management in EnclavesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- TAPS: a first-order verifier for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Protocol-independent secrecyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Verifying authentication protocols in CSPIEEE Transactions on Software Engineering, 1998
- Enclaves: enabling secure collaboration over the InternetIEEE Journal on Selected Areas in Communications, 1997
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978