First Page | Document Content | |
---|---|---|
Date: 2013-04-29 11:09:46Burrows–Abadi–Needham logic Needham–Schroeder protocol Public-key cryptography Cryptographic nonce XTR Deniable authentication Security protocol notation Wide Mouth Frog protocol Cryptographic protocols Cryptography Data | NRL Release Number[removed]The Logic of Authentication Protocols ?Add to Reading ListSource URL: www.nrl.navy.milDownload Document from Source WebsiteFile Size: 492,12 KBShare Document on Facebook |