Authentication tests and the structure of bundles.
From MaRDI portal
Publication:1603655
DOI10.1016/S0304-3975(01)00139-6zbMath1050.68039OpenAlexW2124030056MaRDI QIDQ1603655
Publication date: 15 July 2002
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0304-3975(01)00139-6
Related Items (15)
Analysis of security protocols based on challenge-response ⋮ A tutorial-style introduction to \(\mathsf{DY}^{\star}\) ⋮ Joshua Guttman: pioneering strand spaces ⋮ Injective synchronisation: An extension of the authentication hierarchy ⋮ A (restricted) quantifier elimination for security protocols ⋮ Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA ⋮ State and progress in strand spaces: proving fair exchange ⋮ An inductive approach to strand spaces ⋮ A formal semantics for protocol narrations ⋮ A framework for compositional verification of security protocols ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ Cryptographic Protocol Composition via the Authentication Tests ⋮ Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions ⋮ Authentication tests and the structure of bundles. ⋮ Equal To The Task?
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- An attack on the Needham-Schroeder public-key authentication protocol
- Two attacks on Neuman-Stubblebine authentication protocols
- Authentication tests and the structure of bundles.
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
This page was built for publication: Authentication tests and the structure of bundles.