<--- Back to Details
First PageDocument Content
Cryptography / Fault-tolerant computer systems / Inter-process communication / Public-key cryptography / Burrows–Abadi–Needham logic / Epistemic modal logic / Modal logic / Communications protocol / Consensus / Computing / Logic / Information
Date: 2006-10-21 23:23:16
Cryptography
Fault-tolerant computer systems
Inter-process communication
Public-key cryptography
Burrows–Abadi–Needham logic
Epistemic modal logic
Modal logic
Communications protocol
Consensus
Computing
Logic
Information

Add to Reading List

Source URL: alloy.mit.edu

Download Document from Source Website

File Size: 191,85 KB

Share Document on Facebook

Similar Documents

Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Protocol / Data / Information / Cryptographic protocols

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

DocID: 18vF5 - View Document

Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

DocID: 18kpx - View Document

Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

DocID: 15I1e - View Document

Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

DocID: 15Blo - View Document

Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

DocID: 15fhp - View Document