BurrowsAbadiNeedham logic

Results: 6



#Item
1Automated theorem proving / BurrowsAbadiNeedham logic / -calculus / Modal logic / RSA

Analysis of Cryptographic Protocols using Logics of Belief: an Overview David Monniaux ´ Ecole Normale Sup´erieure

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:19
2Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:59
3Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:41:03
4Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:08
5Public-key cryptography / Public key infrastructure / XTR / BurrowsAbadiNeedham logic / Four-square cipher / OkamotoUchiyama cryptosystem

PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:39:38
6Software engineering / Programming language theory / Computing / C / Struct / ALGOL 68 / BurrowsAbadiNeedham logic / OK / -calculus

Typing One-to-One and One-to-Many Correspondences in Security Protocols Andrew D. Gordon1 and Alan Jeffrey2 1 2

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:35:36
UPDATE