A Formal Approach to Security Architectures
- 18 May 2001
- book chapter
- Published by Springer Nature
- p. 387-398
- https://doi.org/10.1007/3-540-46416-6_33
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Corporate Computer Security '90Computer Fraud & Security Bulletin, 1990
- The Specification and Modeling of Computer SecurityPublished by Defense Technical Information Center (DTIC) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Analyzing Encryption Protocols Using Formal Verification Techniques (Extended Abstract)Lecture Notes in Computer Science, 1988
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976