Data Access Specification and the Most Powerful Symbolic Attacker in MSR
- 25 June 2003
- book chapter
- Published by Springer Nature
- p. 384-416
- https://doi.org/10.1007/3-540-36532-x_23
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Types and effects for asymmetric cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A meta-notation for protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Subtyping dependent typesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Automatically detecting most vulnerabilities in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Typed MSR: Syntax and ExamplesPublished by Springer Nature ,2001
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Casper: A compiler for the analysis of security protocolsJournal of Computer Security, 1998
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- A framework for defining logicsJournal of the ACM, 1993
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983