Logics for cryptographic protocols-virtues and limitations
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 219-226
- https://doi.org/10.1109/csfw.1991.151591
Abstract
The authors discuss the virtues and limitations of several logics for cryptographic protocols focusing primarily on the logics of authentication. They emphasize the scope limitations of these logics rather than their virtues because: (1) their virtues to be better understood and accepted than their limitations; and (2) they hope to stimulate further research that will expand their scope.<>Keywords
This publication has 14 references indexed in Scilit:
- On belief evolution in authentication protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The use of logic in the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logic of communication in hostile environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978