Using logics to detect implementation-dependent flaws [cryptographic protocol design]
- 30 December 2002
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Roles in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Exploring the BAN approach to protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The use of logic in the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Formal semantics for logics of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- Rejoinder to NessettACM SIGOPS Operating Systems Review, 1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978