Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Needham, R.M., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993–999 (1978)
2. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29, 198–208 (1983)
3. Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1), 44–54 (2003)
4. Fidge, C.: A survey of verification techniques for security protocols. Tech. Rep. 01-22, Software Verification Research Centre, School of Information Technology, The University of Queensland (2001)
5. IFIP AICT;F.J. Thayer,2010