Next: Appendix
Up: A semantics for BAN
Previous: Conclusion
- AT91
- Martín Abadi and Mark R. Tuttle. A Semantics for
a Logic of Authentication (Extended Abstract), ACM Symposium on Principles
of Distributed Computing, 1991, Montreal, Quebec, Canada.
- BAN89
- Michael Burrows, Martín Abadi and Roger
Needham. A Logic of Authentication, Report 39, Digital Systems Research
Center, Palo Alto, CA.
- BAN90
- Michael Burrows, Martín Abadi and Roger Needham.
A Logic of Authentication, ACM Transactions on Computer Systems,
Vol. 8, No. 1, February 1990, pp 18-36.
- GEN69
- G. Gentzen, M.E. Szabo (ed.). The collected
papers of Gerhard Gentzen, North-Holland, Amsterdam, 1969.
- GNY90
- Li Gong, Roger Needham and Raphael Yahalom.
Reasoning about Belief in Cryptographic Protocols, IEEE Computer Society
Symposium on Research in Security and Privacy, 1990.
- Ness90
- Dan M. Nessett. A critique of the Burrows,
Abadi and Needham Logic, Operating Systems Review, Vol. 24, No. 2, April
1990, pp 35-38
- Snek91
- Einar Snekkenes. Exploring the BAN Approach
to Protocol Analysis, IEEE Computer Society Symposium on Research in
Security and Privacy, 1991, Oakland, CA.
- Syv91
- Paul Syverson. The Use of Logic in the
Analysis of Cryptographic Protocols, IEEE Computer Society Symposium on
Research in Security and Privacy, 1991, Oakland, CA.
- YW93
- Alec F. Yasinsac and William A. Wulf. Evaluating
Cryptographic Protocols, Report CS-93-66, CS & IPC, University of Virginia.