Equal To The Task?
- 26 September 2002
- book chapter
- Published by Springer Nature
- p. 162-177
- https://doi.org/10.1007/3-540-45853-0_10
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Mixed strand spacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Protocol independence through disjoint encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Bound on Attacks on Authentication ProtocolsPublished by Springer Nature ,2002
- Proving security protocols with model checkers by data independence techniquesJournal of Computer Security, 1999
- Strand spaces: proving security protocols correctJournal of Computer Security, 1999
- Verifying authentication protocols in CSPIEEE Transactions on Software Engineering, 1998
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978