Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
From MaRDI portal
Publication:3540086
DOI10.1007/978-3-540-88387-6_32zbMath1183.94053OpenAlexW1530494274MaRDI QIDQ3540086
Publication date: 20 November 2008
Published in: Automated Technology for Verification and Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88387-6_32
Related Items (1)
Uses Software
Cites Work
- An attack on a recursive authentication protocol. A cautionary tale
- On-the-Fly Model Checking of Fair Non-repudiation Protocols
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- On the Automatic Analysis of Recursive Security Protocols with XOR
- STACS 2004
- CONCUR 2005 – Concurrency Theory
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol