Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
- 1 January 1996
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 351-364
- https://doi.org/10.1007/3-540-61770-1_46
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRLecture Notes in Computer Science, 1996
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- An automatic search for security flaws in key management schemesComputers & Security, 1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- Notes on Communicating Sequential SystemsPublished by Springer Nature ,1986
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978