Back to Results
First PageMeta Content
Information / Needham–Schroeder protocol / Cryptographic nonce / Promela / Public-key cryptography / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / HTTPsec / Cryptographic protocols / Data / Cryptography


Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.
Add to Reading List

Document Date: 2008-06-30 15:34:28


Open Document

File Size: 210,56 KB

Share Result on Facebook

Company

Needham / illustrated using the reduced Needham-Schroeder Public Key Authentication Protocol / /

/

Event

FDA Phase / /

IndustryTerm

typical solution / decryption algorithm / well known authentication protocol / cryptographic protocols / purpose tools / real authentication protocol / trusted key server / cryptographic protocol / sample protocol / /

Organization

Politecnico di Torino / /

Person

Paolo Maggi / /

Position

author / /

Product

Spin / B / any / B. ResRunningAB / /

ProgrammingLanguage

Promela / /

Technology

encryption / cryptography / Public Key Protocol / sample protocol / private key / secret key / Public Key / well known authentication protocol / decryption algorithm / reduced protocol / real authentication protocol / cryptographic protocol / /

SocialTag