A system for the specification and analysis of key management protocols
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 21 references indexed in Scilit:
- A logic of knowledge and belief for reasoning about computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Representing partial knowledge in an algebraic security modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Applying Formal Methods to the Analysis of a Key Management ProtocolPublished by Defense Technical Information Center (DTIC) ,1990
- Seven myths of formal methodsIEEE Software, 1990
- A security scheme for resource sharing over a networkComputers & Security, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987