|
Volumn 1485, Issue , 1998, Pages 361-375
|
Kerberos version IV: Inductive analysis of the secrecy goals
|
Author keywords
Inductive method; Machine proof; Non expired timestamp; Secrecy; Secure key
|
Indexed keywords
SECURITY OF DATA;
SECURITY SYSTEMS;
CRYPTOPROTOCOLS;
DELIVERY MECHANISM;
INDUCTIVE METHOD;
OPERATIONAL MODEL;
SECRECY;
SECURE KEY;
TIME-STAMP;
TIMESTAMPING;
NETWORK SECURITY;
|
EID: 22444455879
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/BFb0055875 Document Type: Conference Paper |
Times cited : (89)
|
References (20)
|