next up previous
Next: About this document Up: A Weakest Precondition Calculus Previous: Protocol Derivation

References

AF97
J. Alves-Foss. The use of belief logics in the presence of causal consistency attacks. In Proc. National Information Systems Security Conference, Oct. 1997.

BAN89
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, Palo Alto, CA, February 1989.

DvOW92
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and authenticated key exchanges. Design Codes and Cryptograhpy, 2:107-125, 1992.

GNY90
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proc. IEEE Symposium on Research in Security and Privacy, pages 234-248, 1990.

Mea96
C Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Proc. ESORICS 96. Springer Verlag, 1996.

NS78
R.M. Needham and M.D. Schroder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.

Sne91
E. Snekkenes. Exploring the BAN approach to protocol analysis. In Proc. IEEE Symposium on Research in Security and Privacy, pages 171-181, 1991.

SvO94
P. Syverson and P. van Oorschot. On unifying some cryptographic protocol logics. In Proc. IEEE Symposium on Research in Security and Privacy, pages 14-28, 1994.

SvO96
P. Syverson and P. van Oorschot. A unified cryptographic protocol logic. Unpublished manuscript, Dec. 1996.

Syv93
P. Syverson. Adding time to a logic of authentication. In Proc. First ACM Conference on Computer and Communications Security, pages 97-101. ACM Press, 1993.

Syv96
P. Syverson. A new look at an old protocol. Operating Systems Review, 30(3):1-4, July 1996.



Jim Alves-Foss
Fri Aug 1 16:00:31 PDT 1997