Generating formal cryptographic protocol specifications
- 17 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 137-146
- https://doi.org/10.1109/risp.1994.296586
Abstract
No abstract availableThis publication has 29 references indexed in Scilit:
- A semantic model for authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logical language for specifying cryptographic protocol requirementsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Deriving the Complete Knowledge of Participants in Cryptographic ProtocolsPublished by Springer Nature ,2001
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Knowledge, Belief, and Semantics in the Analysis of Cryptographic ProtocolsJournal of Computer Security, 1992
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolJournal of Cryptology, 1991
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- On the formal specification and verification of a multiparty session protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983