Analyzing encryption protocols using formal verification techniques
- 1 May 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 7 (4), 448-457
- https://doi.org/10.1109/49.17707
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- Extending Ina Jo with temporal logicIEEE Transactions on Software Engineering, 1989
- Cryptanalysis: a survey of recent resultsProceedings of the IEEE, 1988
- Automated Protocol Validation in Argos: Assertion Proving and Scatter SearchingIEEE Transactions on Software Engineering, 1987
- Expert systems applied to the analysis of key management schemesComputers & Security, 1987
- Testing Formal Specifications to Detect Design ErrorsIEEE Transactions on Software Engineering, 1985
- Reflections on trusting trustCommunications of the ACM, 1984
- Protocol Verification via ProjectionsIEEE Transactions on Software Engineering, 1984
- Formal Verification of a Secure Network with End-to-End EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Social processes and proofs of theorems and programsCommunications of the ACM, 1979