![Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information](https://www.pdfsearch.io/img/5b6efc897283a65ac18a8abba10cce15.jpg)
| Document Date: 2010-05-31 18:52:04 Open Document File Size: 130,47 KBShare Result on Facebook
City Cambridge / Burnaby / / Company IEEE Computer Society Press / MIT Press / Needham / Implementing Dynamical Systems / / Country Canada / / / Event FDA Phase / / Facility Simon Fraser University / / IndustryTerm valid protocol / cryptographic protocols / public key protocols / multi-agent systems / secure protocol / n-line protocol / message passing systems / formal tool / protocol verification tool / Formal tools / particular network / cryptographic protocol / security protocols / / Organization Torsten Grote and Aaron Hunter School of Computing Science / MIT / Simon Fraser University / / Person James P. Delgrande / Pirri / Torsten Grote / / Position translator / flexible model of agent communication / hunter / / Product has / AVISPA1 / / ProvinceOrState British Columbia / / PublishedMedium IEEE Transactions on Information Theory / / Technology encryption / Challenge-Response protocol / artificial intelligence / cryptographic protocol / CR protocol / valid protocol / agent communication involving encryption / public key protocols / specified protocol / n-line protocol / secure protocol / Verifying security protocols / ChallengeResponse protocol / / URL http /
SocialTag |