Back to Results
First PageMeta Content
Cryptographic protocols / Propositional calculus / Boolean algebra / Classical logic / Kerberos / Modal logic / Public-key cryptography / Yahalom / Burrows–Abadi–Needham logic / Logic / Cryptography / Mathematical logic


A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation
Add to Reading List

Document Date: 2007-04-26 00:00:00


Open Document

File Size: 257,57 KB

Share Result on Facebook

City

Cambridge / /

Company

BP / Needham / Abadi Digital Equipment Corporation Systems / Mark R. Tuttle Digital Equipment Corporation / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Mark R. Tuttle Digital Equipment Corporation Cambridge Research Lab One Kendall Square / /

IndustryTerm

honest protocol / authentication protocol / secure systems / given protocol / meta-linguistic tools / actual systems / similar protocols / reasonable protocols / legitimate applications / actual protocol / formulas annotating protocols / authentication protocols / zero-knowledge proof systems / encryption technology / /

/

Position

tractable model for analysis / /

Product

M-16 / BAN89 / Figure / /

ProvinceOrState

Massachusetts / /

Technology

encryption / authentication protocol / cryptography / reasonable protocols / local protocol / formulas annotating protocols / actual protocol / encryption technology / Yahalom protocol / Kerberos key distribution protocol / authentication protocols / idealized protocol / given protocol / honest protocol / public key encryption / /

SocialTag