Formal requirements for key distribution protocols
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 320-331
- https://doi.org/10.1007/bfb0053447
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A Logical Language for Specifying Cryptographic Protocol RequirementsPublished by Defense Technical Information Center (DTIC) ,1993
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983