Formal methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art review
- 1 January 1997
- book chapter
- Published by Springer Nature
Abstract
No abstract availableThis publication has 39 references indexed in Scilit:
- What do we mean by entity authentication?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Generating formal cryptographic protocol specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An interface specification language for automatically analyzing cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Prudent engineering practice for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1994
- UEPS — A second generation electronic walletPublished by Springer Nature ,1992
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- A security scheme for resource sharing over a networkComputers & Security, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981