Kerberos Version IV: Inductive analysis of the secrecy goals
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 361-375
- https://doi.org/10.1007/bfb0055875
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Inductive Analysis of the Internet Protocol TLSPublished by Springer Nature ,1998
- Mechanising BAN Kerberos by the inductive methodPublished by Springer Nature ,1998
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- IsabellePublished by Springer Nature ,1994
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,1993
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989