Deciding cryptographic protocol adequacy with HOL: The implementation
- 1 January 1996
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A HOL extension of GNY for automatically analyzing cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A system for the specification and analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Interrogator modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Deciding cryptographic protocol adequacy with HOLPublished by Springer Nature ,1995
- Server-process restrictiveness in HOLPublished by Springer Nature ,1994
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- The Interrogator A Tool for Cryptographic Protocol SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Timestamps in key distribution protocolsCommunications of the ACM, 1981