Back to Results
First PageMeta Content
Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information


Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca
Add to Reading List

Document Date: 2008-05-19 14:54:15


Open Document

File Size: 166,92 KB

Share Result on Facebook

Company

2F / Message Passing Systems / Needham / ACM Press / /

Currency

pence / /

/

Event

FDA Phase / General or Shareholder Meeting / /

IndustryTerm

non-monotonic belief change operator / authentication protocol / industrial security protocols / revision operator / few practical applications / cryptographic protocols / given protocol / formal belief change operator / belief revision operator / belief evolution operator / belief update operator / same methods to more complex protocol / cryptographic protocol / transition systems / authentication protocols / /

Organization

American Association for Artificial IntelliCopyright / James P. Delgrande School of Computing Science Simon Fraser University Burnaby / Naval Research Lab. / /

Person

Aaron Hunter / Logic As / Ai / /

Position

standard model for cryptographic protocol analysis / /

Product

P / A1 / Q / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

ca Abstract Cryptographic protocols / authentication protocol / Challenge-Response Protocol / cryptography / industrial security protocols / Verifying Authentication Protocols / public key / artificial intelligence / authentication protocols / describing authentication protocols / cryptographic protocol / Security Protocols / given protocol / secret key / Preliminaries Authentication Protocols / Belief Evolution Protocol / specific protocol / Example The Challenge-Response protocol / /

URL

www.aaai.org / /

SocialTag