Analyzing Encryption Protocols Using Formal Verification Techniques (Extended Abstract)
- 1 January 1988
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 289-305
- https://doi.org/10.1007/3-540-48184-2_26
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Automated Protocol Validation in Argos: Assertion Proving and Scatter SearchingIEEE Transactions on Software Engineering, 1987
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- INATESTACM SIGSOFT Software Engineering Notes, 1985
- How to (Selectively) Broadcast A SecretPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Testing Formal Specifications to Detect Design ErrorsIEEE Transactions on Software Engineering, 1985
- Protocol Verification via ProjectionsIEEE Transactions on Software Engineering, 1984
- Guest Editorial: Protocol Specification, Testing, and VerificationIEEE Transactions on Communications, 1982
- Specification and Verification of Communication Protocols in AFFIRM Using State Transition ModelsIEEE Transactions on Software Engineering, 1982