Next: About this document
Up: A Weakest Precondition Calculus
Previous: Protocol Derivation
References
- AF97
-
J. Alves-Foss.
The use of belief logics in the presence of causal consistency
attacks.
In Proc. National Information Systems Security Conference, Oct.
1997.
- BAN89
-
M. Burrows, M. Abadi, and R. Needham.
A logic of authentication.
Technical Report 39, DEC Systems Research Center, Palo Alto, CA,
February 1989.
- DvOW92
-
W. Diffie, P. van Oorschot, and M. Wiener.
Authentication and authenticated key exchanges.
Design Codes and Cryptograhpy, 2:107-125, 1992.
- GNY90
-
L. Gong, R. Needham, and R. Yahalom.
Reasoning about belief in cryptographic protocols.
In Proc. IEEE Symposium on Research in Security and Privacy,
pages 234-248, 1990.
- Mea96
-
C Meadows.
Analyzing the Needham-Schroeder public key protocol: A
comparison of two approaches.
In Proc. ESORICS 96. Springer Verlag, 1996.
- NS78
-
R.M. Needham and M.D. Schroder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, 1978.
- Sne91
-
E. Snekkenes.
Exploring the BAN approach to protocol analysis.
In Proc. IEEE Symposium on Research in Security and Privacy,
pages 171-181, 1991.
- SvO94
-
P. Syverson and P. van Oorschot.
On unifying some cryptographic protocol logics.
In Proc. IEEE Symposium on Research in Security and Privacy,
pages 14-28, 1994.
- SvO96
-
P. Syverson and P. van Oorschot.
A unified cryptographic protocol logic.
Unpublished manuscript, Dec. 1996.
- Syv93
-
P. Syverson.
Adding time to a logic of authentication.
In Proc. First ACM Conference on Computer and Communications
Security, pages 97-101. ACM Press, 1993.
- Syv96
-
P. Syverson.
A new look at an old protocol.
Operating Systems Review, 30(3):1-4, July 1996.
Jim Alves-Foss
Fri Aug 1 16:00:31 PDT 1997