Formal correctness of security protocols.
zbMath1176.68026MaRDI QIDQ869815
Publication date: 9 March 2007
Published in: Information Security and Cryptography (Search for Journal in Brave)
verificationfairnesseventreliabilitytraceagentconfidentialityunicityinspectionguaranteeauthenticationIsabellenon-repudiationtheorem proversecurity protocolaccountabilityinductive methodcryptographic keycertified e-mailcompromised agentKerberosmessageNeedham-Schroeder keynoncesreceptionShoup-Rubin protocolsmartcardsspytheory hierarchythreat modeltimestampingTMN protocolWoo-Lam protocolZhou-Gollmann
Network design and communication in computer systems (68M10) Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to computer science (68-02) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Uses Software
This page was built for publication: Formal correctness of security protocols.