Intensional specifications of security protocols
- 23 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 435, 28-38
- https://doi.org/10.1109/csfw.1996.503688
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- Modelling and verifying key-exchange protocols using CSP and FDRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- Cryptanalysis and protocol failuresCommunications of the ACM, 1994
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Key Distribution Protocol for Digital Mobile Communication SystemsPublished by Springer Nature ,1990