An Improved Constraint-Based System for the Verification of Security Protocols
- 5 September 2002
- book chapter
- Published by Springer Nature
- p. 326-341
- https://doi.org/10.1007/3-540-45789-5_24
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Proof Theory, Transformations, and Logic Programming for Debugging Security ProtocolsPublished by Springer Nature ,2002
- Compiling and Verifying Security ProtocolsPublished by Springer Nature ,2002
- Verifying security protocols as planning in logic programmingACM Transactions on Computational Logic, 2001
- Symbolic Trace Analysis of Cryptographic ProtocolsPublished by Springer Nature ,2001
- Lazy Infinite-State Analysis of Security ProtocolsPublished by Springer Nature ,1999
- Kerberos Version IV: Inductive analysis of the secrecy goalsPublished by Springer Nature ,1998
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- A lesson on authentication protocol designACM SIGOPS Operating Systems Review, 1994
- A logic of authenticationACM Transactions on Computer Systems, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983