Back to Results
First PageMeta Content
Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic


Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of
Add to Reading List

Document Date: 2003-12-15 20:24:55


Open Document

File Size: 328,29 KB

Share Result on Facebook

Company

Needham / IOS Press / BV (S) BV / /

Currency

USD / /

/

Facility

Kestrel Institute / Stanford University / /

/

IndustryTerm

public key protocol / automated tools / certain authentication protocols / above protocol / secrecy protocols / security protocols / /

Organization

Stanford University / Kestrel Institute / Computer Science Department / /

Person

Nancy Durgin / Schroeder / John Mitchell / Dusko Pavlovic / /

/

Product

Floyd / /

SportsLeague

Stanford University / /

Technology

encryption / Schroeder protocol / cryptography / public key protocol / above protocol / protocols The encryption / symmetric-key encryption / expected encryption / secrecy protocols / security protocols / NSL protocol / public key encryption / certain authentication protocols / /

SocialTag