Back to Results
First PageMeta Content
First-order logic / Needham–Schroeder protocol / Kerberos / Cyberwarfare / Mathematics / Burrows–Abadi–Needham logic / Cryptography / Logic


A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper
Add to Reading List

Document Date: 2007-09-13 10:55:29


Open Document

File Size: 405,93 KB

Share Result on Facebook

Company

Needham / /

IndustryTerm

given protocol / authentication protocols / security protocols / /

Person

Robert Harper / /

Technology

encryption / authentication protocols / specifying authentication protocols / security protocols / given protocol / secret key / public key / /

SocialTag