Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
ACM Transactions on Computer Systems (TOCS)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Using encryption for authentication in large networks of computers
Communications of the ACM
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Formalising theories of trust for authentication protocols
Information Systems Frontiers
A novel approach for protection of confidential web contents
ECC'11 Proceedings of the 5th European conference on European computing conference
Hi-index | 0.00 |
The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.