Burrows–Abadi–Needham logic

Results: 22



#Item
11Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
12Formal languages / Mathematical logic / Cryptographic protocols / Semantics / Burrows–Abadi–Needham logic / Interpretation / First-order logic / Constructible universe / Ground expression / Logic / Mathematics / Model theory

Analysis of authentication protocols Intership report St´ephane Glondu ENS de Cachan∗ September 3, 2006

Add to Reading List

Source URL: stephane.glondu.net

Language: English - Date: 2006-09-03 17:53:44
13Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Communications protocol / Model theory / Quantifier elimination / Security protocol notation / Cryptographic protocols / Data / Information

A (restricted) quantifier elimination for security protocols ? R. Ramanujam ∗ The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai[removed], India S.P. Suresh

Add to Reading List

Source URL: www.imsc.res.in

Language: English - Date: 2006-08-04 05:49:00
14Andrew File System / Carnegie Mellon University / Cache / Burrows–Abadi–Needham logic / Internet Relay Chat / Transmission Control Protocol / OSI protocols / Internet / Computing / Network file systems / Online chat

Using Belief to Reason About Cache Coherence L. Mummert, J.M. Wing, and M. Satyanarayanan Carnegie Mellon University Abstract The notion of belief has been useful in reasoning about authentication protocols. In this pape

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 1999-07-15 13:31:57
15Cryptographic protocols / Propositional calculus / Boolean algebra / Classical logic / Kerberos / Modal logic / Public-key cryptography / Yahalom / Burrows–Abadi–Needham logic / Logic / Cryptography / Mathematical logic

A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
16Information / Communicating sequential processes / Communications protocol / Cryptographic primitive / Public-key cryptography / Model checking / Yahalom / Burrows–Abadi–Needham logic / Protocol / Cryptographic protocols / Cryptography / Data

The Modelling and Analysis of Security Protocols: the CSP Approach P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2010-12-15 14:57:33
17Andrew File System / Carnegie Mellon University / Cache / Internet Relay Chat / Burrows–Abadi–Needham logic / Representational state transfer / Callback / Computing / Online chat / Cloud standards

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2011-08-18 16:26:38
18Philosophical logic / Formal languages / Predicate logic / Burrows–Abadi–Needham logic / Interpretation / Modal logic / First-order logic / Kerberos / Substitution / Logic / Propositional calculus / Model theory

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 39, NO. 4, AUGUST[removed]

Add to Reading List

Source URL: www98.griffith.edu.au

Language: English - Date: 2010-06-29 02:42:57
19First-order logic / Needham–Schroeder protocol / Kerberos / Cyberwarfare / Mathematics / Burrows–Abadi–Needham logic / Cryptography / Logic

A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-09-13 10:55:29
20Shared secret / Burrows–Abadi–Needham logic / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2007-10-21 18:30:02
UPDATE