Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
- 4 July 2002
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A tool for lazy verification of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A meta-notation for protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Analyzing security protocols with secrecy types and logic programsPublished by Association for Computing Machinery (ACM) ,2002
- Lazy Infinite-State Analysis of Security ProtocolsPublished by Springer Nature ,1999
- Kerberos Version IV: Inductive analysis of the secrecy goalsPublished by Springer Nature ,1998
- Formal Verification of Cryptographic Protocols: A SurveyPublished by Defense Technical Information Center (DTIC) ,1995
- A logic of authenticationACM Transactions on Computer Systems, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983