Back to Results
First PageMeta Content
Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data


NRL Release Number[removed]The Logic of Authentication Protocols ?
Add to Reading List

Document Date: 2013-04-29 11:09:46


Open Document

File Size: 492,12 KB

Share Result on Facebook

City

Bertinoro / Washington / DC / Alexandria / /

Company

AES / Needham / Sciences Division ITT Industries Inc. / High Assurance Computer Systems Naval Research Laboratory / /

Country

Italy / /

Currency

pence / /

/

Event

FDA Phase / /

IndustryTerm

authentication protocol / symbolic execution tool / cryptographic algorithms / basic authentication protocols / authentication protocols / Security protocols / /

Organization

Digital Systems Research Center / Royal Society of London / National Science Foundation / Center for High Assurance Computer Systems Naval Research Laboratory Washington / Royal Society / 1st International School on Foundations of Security Analysis and Design / /

Person

Bob / Alice / Ina Jo / /

Position

spy / first author / representative / second author / /

Product

NS78 / MCF87 / Section / /

ProgrammingLanguage

Prolog / DC / /

ProvinceOrState

Virginia / /

PublishedMedium

Proceedings of the Royal Society / /

Technology

encryption / authentication protocol / cryptography / public key / Authentication Protocols / idealized protocol / then basic authentication protocols / Shared-Key protocol / 2.3 BAN Protocol / Security protocols / private key / secret key / digital signature / /

SocialTag