<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Protocol composition logic / Automated theorem proving / Cryptographic protocols / Substitution / Digital signature / Communications protocol / Transport Layer Security
Date: 2010-07-17 01:14:12
Cryptography
Public-key cryptography
Protocol composition logic
Automated theorem proving
Cryptographic protocols
Substitution
Digital signature
Communications protocol
Transport Layer Security

Add to Reading List

Source URL: seclab.stanford.edu

Download Document from Source Website

File Size: 735,89 KB

Share Document on Facebook

Similar Documents

Theoretical computer science / Logic in computer science / Programming language semantics / Communications protocol / Data transmission / Model theory / Operational semantics / Models of computation

A Formal Model and Composition Language for Context-Aware Service Protocols A Formal Model and Composition Language for Context-Aware Service Protocols Javier Cubo, Carlos Canal, Ernesto Pimentel, Gwen Sala¨ un

DocID: 1pZ60 - View Document

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

DocID: 1mytU - View Document

Logic / Mathematics / Abstraction / Formal languages / Mathematical logic / Linear temporal logic / Temporal logic / Automated theorem proving / Propositional calculus / Substitution / IP / Interpretation

Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

DocID: 1kfPs - View Document

Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

DocID: 1kaIs - View Document

Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

DocID: 1jZpk - View Document