Using narrowing in the analysis of key management protocols
Open Access
- 7 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- Public protection of softwareACM Transactions on Computer Systems, 1987
- Expert systems applied to the analysis of key management schemesComputers & Security, 1987
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- The Interrogator A Tool for Cryptographic Protocol SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Programming in PrologPublished by Springer Nature ,1984
- On the security of multi-party ping-pong protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- On the security of ping-pong protocolsInformation and Control, 1982
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978