Formal analysis of Kerberos 5
From MaRDI portal
Publication:860899
DOI10.1016/j.tcs.2006.08.040zbMath1153.94448OpenAlexW2118377274MaRDI QIDQ860899
Aaron D. Jaggard, Frederick Butler, Iliano Cervesato, Christopher Walstad, Andrej Scedrov
Publication date: 9 January 2007
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2006.08.040
Related Items
Formal analysis of Kerberos 5, Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later, Bounded memory Dolev-Yao adversaries in collaborative systems, Rule-based static analysis of network protocol implementations, Breaking and fixing public-key Kerberos, Protocol Composition Logic (PCL), Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Uses Software
Cites Work