A Method for Automatic Cryptographic Protocol Verification
- 25 May 2000
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Lower and upper bounds for attacks on authentication protocolsPublished by Association for Computing Machinery (ACM) ,1999
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Secrecy by typing in security protocolsPublished by Springer Nature ,1997
- An approach to the formal verification of cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1996
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- Provably secure session key distributionPublished by Association for Computing Machinery (ACM) ,1995
- The NRL Protocol Analyzer: An OverviewPublished by Defense Technical Information Center (DTIC) ,1994
- Abstract interpretation and application to logic programsThe Journal of Logic Programming, 1992
- Graph-Based Algorithms for Boolean Function ManipulationIEEE Transactions on Computers, 1986