Formal analysis of Kerberos 5
- 1 November 2006
- journal article
- Published by Elsevier in Theoretical Computer Science
- Vol. 367 (1-2) , 57-87
- https://doi.org/10.1016/j.tcs.2006.08.040
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- A comparison between strand spaces and multiset rewriting for security protocol analysisJournal of Computer Security, 2005
- Specifying Kerberos 5 cross-realm authenticationPublished by Association for Computing Machinery (ACM) ,2005
- Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent TypesElectronic Notes in Theoretical Computer Science, 2005
- A composable cryptographic library with nested operationsPublished by Association for Computing Machinery (ACM) ,2003
- On Representing Biological Systems through Multiset RewritingPublished by Springer Nature ,2003
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Universally composable security: a new paradigm for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security ProtocolsPublished by Springer Nature ,1998
- Kerberos Version IV: Inductive analysis of the secrecy goalsPublished by Springer Nature ,1998
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986