Automatic verification of cryptographic protocols with SETHEO
- 1 January 1997
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Title: Computer-related risks : Author: Peter G Neumann Publisher: Addison-Wesley Publishing Co. ISBN: 0-201-55805-XComputer Fraud & Security Bulletin, 1995
- Formal Verification of Cryptographic Protocols: A SurveyPublished by Defense Technical Information Center (DTIC) ,1995
- Controlled integration of the cut rule into connection tableau calculiJournal of Automated Reasoning, 1994
- SETHEO: A high-performance theorem proverJournal of Automated Reasoning, 1992
- Experiments in automated deduction with condensed detachmentPublished by Springer Nature ,1992
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- A logic of authenticationACM Transactions on Computer Systems, 1990
- A logic of authenticationACM SIGOPS Operating Systems Review, 1989
- HOL: A Proof Generating System for Higher-Order LogicPublished by Springer Nature ,1988
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987