next up previous
Next: Appendix Up: A semantics for BAN Previous: Conclusion

References

AT91
Martín Abadi and Mark R. Tuttle. A Semantics for a Logic of Authentication (Extended Abstract), ACM Symposium on Principles of Distributed Computing, 1991, Montreal, Quebec, Canada.

BAN89
Michael Burrows, Martín Abadi and Roger Needham. A Logic of Authentication, Report 39, Digital Systems Research Center, Palo Alto, CA.

BAN90
Michael Burrows, Martín Abadi and Roger Needham. A Logic of Authentication, ACM Transactions on Computer Systems, Vol. 8, No. 1, February 1990, pp 18-36.

GEN69
G. Gentzen, M.E. Szabo (ed.). The collected papers of Gerhard Gentzen, North-Holland, Amsterdam, 1969.

GNY90
Li Gong, Roger Needham and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols, IEEE Computer Society Symposium on Research in Security and Privacy, 1990.

Ness90
Dan M. Nessett. A critique of the Burrows, Abadi and Needham Logic, Operating Systems Review, Vol. 24, No. 2, April 1990, pp 35-38

Snek91
Einar Snekkenes. Exploring the BAN Approach to Protocol Analysis, IEEE Computer Society Symposium on Research in Security and Privacy, 1991, Oakland, CA.

Syv91
Paul Syverson. The Use of Logic in the Analysis of Cryptographic Protocols, IEEE Computer Society Symposium on Research in Security and Privacy, 1991, Oakland, CA.

YW93
Alec F. Yasinsac and William A. Wulf. Evaluating Cryptographic Protocols, Report CS-93-66, CS & IPC, University of Virginia.