Authentication tests and the structure of bundles.
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1962758 (Why is no real title available?)
- scientific article; zbMATH DE number 3275554 (Why is no real title available?)
- An attack on the Needham-Schroeder public-key authentication protocol
- Authentication tests and the structure of bundles.
- On the security of public key protocols
- Two attacks on Neuman-Stubblebine authentication protocols
- Using encryption for authentication in large networks of computers
Cited in
(19)- Equal to the task?
- Distributed temporal logic for the analysis of security protocol models
- Key compromise, strand spaces, and the authentication tests
- A (restricted) quantifier elimination for security protocols
- A formal semantics for protocol narrations
- State and progress in strand spaces: proving fair exchange
- Injective synchronisation: An extension of the authentication hierarchy
- Analysis of security protocols based on authentication test
- scientific article; zbMATH DE number 1962757 (Why is no real title available?)
- Skeletons, homomorphisms, and shapes: characterizing protocol executions
- Analysis of security protocols based on challenge-response
- A tutorial-style introduction to \(\mathsf{DY}^{\star}\)
- Joshua Guttman: pioneering strand spaces
- Authentication tests and the structure of bundles.
- An inductive approach to strand spaces
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA
- A framework for compositional verification of security protocols
- Message Confidentiality Testing of Security Protocols – Passive Monitoring and Active Checking
- Cryptographic Protocol Composition via the Authentication Tests
This page was built for publication: Authentication tests and the structure of bundles.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1603655)