<--- Back to Details
First PageDocument Content
Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data
Date: 2013-04-29 11:09:46
Burrows–Abadi–Needham logic
Needham–Schroeder protocol
Public-key cryptography
Cryptographic nonce
XTR
Deniable authentication
Security protocol notation
Wide Mouth Frog protocol
Cryptographic protocols
Cryptography
Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Download Document from Source Website

File Size: 492,12 KB

Share Document on Facebook

Similar Documents

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

DocID: 18vF5 - View Document

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

DocID: 18kpx - View Document

Journal of Computer Security–721 IOS Press 677  A compositional logic for proving security properties of

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

DocID: 15I1e - View Document

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

DocID: 15Blo - View Document

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

DocID: 15fhp - View Document