Author:
Bella Giampaolo,Paulson Lawrence C.
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. G. Bella, L. C. Paulson. Using Isabelle to Prove Properties of the Kerberos Authentication System. In Proc. of Workshop on Design and Formal Verification of Security Protocols, Orman and Meadows (eds.), DIMACS, 1997.
2. S. M. Bellovin, M. Merritt. Limitations of the Kerberos authentication system. Computer Comm. Review, 20(5), 119–132, 1990.
3. D. Bolignano. Towards a Mechanization of Cryptographic Protocol Verification. In Proc. of Conference on Computer Aided Verification, Springer Verlag, 1997.
4. S. H. Brackin. A HOL Extension of GNY for Automatically Analyzing Cryptographic Protocols. In Proc. of Computer Security Foundations Workshop, IEEE Press, 1996.
5. M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London, 426:233–271, 1989.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Interactional Freedom and Cybersecurity;Innovative Security Solutions for Information Technology and Communications;2023
2. Refining security protocols;Journal of Computer Security;2017-11-30
3. Refining Key Establishment;2012 IEEE 25th Computer Security Foundations Symposium;2012-06
4. A symbolic decision procedure for cryptographic protocols with time stamps;The Journal of Logic and Algebraic Programming;2005-09
5. A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps;CONCUR 2004 - Concurrency Theory;2004