Author:
Kemmerer R.,Meadows C.,Millen J.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference29 articles.
1. Abadi, M., and M. R. Tuttle, A Semantics for a Logic of Authentication, Proceedings of the 10th Annual ACM Symposium on Distributed Computing, ACM Press, New York, August 1991, pp. 201–206.
2. Bieber, P., A Logic of Communication in a Hostile Environment, Proceedings of the Computer Security Foundations Workshop III, IEEE Computer Society Press, New York, June 1990, pp. 14–22.
3. Boudet, A., Unification in a Combination of Equational Theories: an Efficient Algorithm, Proceedings of the 10th International Conference on Automated Deduction, Springer-Verlag, New York, 1990, pp. 292–307.
4. Burns, J., and C. J. Mitchell, A Security Scheme for Resource Sharing Over a Network, Comput. Security, Vol. 9, 1990, pp. 67–76.
5. Burrows, M., M. Abadi, and R. M. Needham, A Logic of Authentication, ACM Trans. Comput. Systems, Vol. 8, No. 1, February 1990, pp. 18–36.
Cited by
112 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vermischtes;Moderne Verfahren der Kryptographie;2022
2. Joshua Guttman: Pioneering Strand Spaces;Protocols, Strands, and Logic;2021
3. Cryptocurrencies;Advances in Information Security;2020-12-04
4. Symbolic Encryption with Pseudorandom Keys;Advances in Cryptology – EUROCRYPT 2019;2019
5. Key Reminiscences;Foundations of Security, Protocols, and Equational Reasoning;2019