Needham–Schroeder protocol

Results: 30



#Item
21Searching for Shapes in Cryptographic Protocols (extended version)? Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer The MITRE Corporation  Abstract. We describe a method for enumerating all essentially differe

Searching for Shapes in Cryptographic Protocols (extended version)? Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer The MITRE Corporation Abstract. We describe a method for enumerating all essentially differe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-02 08:32:07
22A Light-weight Security Protocol for RFID System.

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:24
23Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

Add to Reading List

Source URL: www.tschofenig.priv.at

Language: English - Date: 2014-03-04 10:40:45
24Logical Methods in Computer Science Vol. 10(2:[removed], pp. 1–50 www.lmcs-online.org Submitted Published

Logical Methods in Computer Science Vol. 10(2:[removed], pp. 1–50 www.lmcs-online.org Submitted Published

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-06-23 05:57:16
25Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:01
26Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR Ali Alshehri, Johann A. Briffa, Steve Schneider and Stephan Wesemeyer Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: A.A.Als

Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR Ali Alshehri, Johann A. Briffa, Steve Schneider and Stephan Wesemeyer Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: A.A.Als

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2012-12-22 16:41:06
27Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.

Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.

Add to Reading List

Source URL: spinroot.com

Language: English - Date: 2008-06-30 15:34:28
28Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
29A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-09-13 10:55:29
30Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory

Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-26 10:17:27