A bisimulation method for cryptographic protocols
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Using temporal logic to specify and verify cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Reasoning about cryptographic protocols in the spi calculusPublished by Springer Nature ,1997
- Secrecy by typing in security protocolsPublished by Springer Nature ,1997
- An approach to the formal verification of cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1996
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987