Mechanized proofs for a recursive authentication protocol
- 22 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Analyzing the Needham-Schroeder public key protocol: A comparison of two approachesPublished by Springer Nature ,1996
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987