Author:
Guttman Joshua D.,Thayer F.Javier
Subject
General Computer Science,Theoretical Computer Science
Reference29 articles.
1. M. Burrows, M. Abadi, R. Needham, A logic of authentication, Proc. Roy. Soc. Ser. A 426 (1871) 233–271; also appeared as SRC Research Report 39 and, in a shortened form, in ACM Trans. Computer Systems 8 (1) (1990) 18–36.
2. Optimal privacy and authentication on a portable communications system;Carlsen;Oper. Systems Rev.,1994
3. I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, A meta-notation for protocol analysis, in: Proc. 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Silver Spring, MD, 1999.
4. J. Clark, J. Jacob, A survey of authentication protocol literature: Version 1.0, Department of Computer Science, University of York, 1997.
5. E. Clarke, S. Jha, W. Marrero, Using state space exploration and a natural deduction style message derivation engine to verify security protocols, in: Proc. IFIP Working Conf. on Programming Concepts and Methods (PROCOMET), 1998.
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献