Back to Results
First PageMeta Content
Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information


Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.
Add to Reading List

Document Date: 2010-05-31 18:52:04


Open Document

File Size: 130,47 KB

Share Result on Facebook

City

Cambridge / Burnaby / /

Company

IEEE Computer Society Press / MIT Press / Needham / Implementing Dynamical Systems / /

Country

Canada / /

/

Event

FDA Phase / /

Facility

Simon Fraser University / /

IndustryTerm

valid protocol / cryptographic protocols / public key protocols / multi-agent systems / secure protocol / n-line protocol / message passing systems / formal tool / protocol verification tool / Formal tools / particular network / cryptographic protocol / security protocols / /

Organization

Torsten Grote and Aaron Hunter School of Computing Science / MIT / Simon Fraser University / /

Person

James P. Delgrande / Pirri / Torsten Grote / /

Position

translator / flexible model of agent communication / hunter / /

Product

has / AVISPA1 / /

ProvinceOrState

British Columbia / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

encryption / Challenge-Response protocol / artificial intelligence / cryptographic protocol / CR protocol / valid protocol / agent communication involving encryption / public key protocols / specified protocol / n-line protocol / secure protocol / Verifying security protocols / ChallengeResponse protocol / /

URL

http /

SocialTag