ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Hi-index | 0.00 |
Analyses of the Needham-Schroeder protocol using the logics SVO and BAN are discussed. It is shown that the protocol may fail to meet goals derived in the [BAN89] analysis of it. The features of SVO analysis revealing the limitations on appropriateness of these goals are indicated.