Security Analysis Based on BAN Logic
Author:
Shang Tao,Liu Jianwei
Publisher
Springer Singapore
Reference13 articles.
1. Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)
2. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)
3. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(20), 198–208 (1983)
4. Lal, S., Jain, M., Chaplot, V.: Approaches to formal verification of security protocols.
arXiv:1101.1815
(2011)
5. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)