Decision procedures for the analysis of cryptographic protocols by logics of belief
- 20 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Narrowing terminates for encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On unifying some cryptographic protocol logicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Automated analysis of cryptographic protocols using MurφPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Model Checking for Security Protocols,Published by Defense Technical Information Center (DTIC) ,1997
- Automatic verification of cryptographic protocols with SETHEOPublished by Springer Nature ,1997
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989