next up previous
Next: About this document Up: CryptoLog: A Theorem Prover Previous: Conclusions

References

1
M. Burrows, M. Abadi, R. Needham, A logic of Authentication, Digital System Research Center Report 39, Palo Alto, California, February 1989.
2
V.D. Gligor, R. Kailar, S. Stubblebine and L. Gong, Logics for Cryptographic Protocols -- Virtues and Limittions, In Proceedings of the IEEE Computer Security Foundations Workshop IV, Franconia, New Hampshire, June 1991, pp. 219-226.
3
Li Gong, Roger Needham, and Raphael Yahalom, Reasoning about Belief in Cryptographic Procols, in Proceedings of the IEEE 1990 Symposium on Security and Privacy, Oakland, California, May 1990, oo. 234-248.
4
L.C. Paulson, Isabelle, A Generic Theorem Prover, Springer, 1994, LNCS 828.
5
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR, in T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems, Second International Workshop, TACAS'96, LNCS 1055, pp. 147-166, 1996.


Bart De Decker
Mon Aug 4 16:31:43 MET DST 1997