Specifying Authentication Protocols Using Rewriting and Strategies
- 29 March 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 138-152
- https://doi.org/10.1007/3-540-45241-9_10
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Protocol verification as a hardware design aidPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Abstracting Cryptographic Protocols with Tree AutomataLecture Notes in Computer Science, 1999
- From Rewrite Theories to Temporal Logic TheoriesElectronic Notes in Theoretical Computer Science, 1998
- An Overview of ELANElectronic Notes in Theoretical Computer Science, 1998
- Casper: A compiler for the analysis of security protocolsJournal of Computer Security, 1998
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRLecture Notes in Computer Science, 1996
- Analyzing the Needham-Schroeder public key protocol: A comparison of two approachesLecture Notes in Computer Science, 1996
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978