메뉴 건너뛰기




Volumn 144, Issue 1, 1997, Pages 28-32

Logic for verifying public-key cryptographic protocols

Author keywords

Authentication; Cryptographic protocol verification; Deductive reasoning; Logic; Public key cryptography; Security protocols

Indexed keywords

CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; FORMAL LOGIC; INFERENCE ENGINES; KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 0030672045     PISSN: 13502387     EISSN: None     Source Type: Journal    
DOI: 10.1049/ip-cdt:19970838     Document Type: Article
Times cited : (35)

References (15)
  • 7
    • 0013270364 scopus 로고
    • A logic for the analysis of cryptographic protocols
    • December
    • SYVERSON, P.: 'A logic for the analysis of cryptographic protocols'. Naval research Laboratory Formal Report 9305, December 1990
    • (1990) Naval Research Laboratory Formal Report , vol.9305
    • Syverson, P.1
  • 9
    • 84945708698 scopus 로고
    • An axiometric basis for computer programing
    • HOARE, C.A.R.: 'An axiometric basis for computer programing', Commun. ACM, 1969, 12, (10), pp. 576-580, 583
    • (1969) Commun. ACM , vol.12 , Issue.10 , pp. 576-580
    • Hoare, C.A.R.1
  • 11
  • 15
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NEEDHAM, R.M., and SCHROEDER, M.D.: 'Using encryption for authentication in large networks of computers', Commun. ACM, 1978, 21, (12), pp. 993-999
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.