On unifying some cryptographic protocol logics
- 17 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- Roles in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Towards formal analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The use of logic in the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Knowledge, Belief, and Semantics in the Analysis of Cryptographic ProtocolsJournal of Computer Security, 1992
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- Key Distribution Protocol for Digital Mobile Communication SystemsPublished by Springer Nature ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989