|
Volumn 2, Issue , 2009, Pages 467-470
|
Security analysis of the kerberos protocol using BAN logic
|
Author keywords
BAN logic; Formal analysis; Kerberos protocol
|
Indexed keywords
BAN LOGIC;
FORMAL ANALYSIS;
IDENTITY AUTHENTICATION PROTOCOL;
KERBEROS PROTOCOL;
SECURITY ANALYSIS;
FORMAL METHODS;
INTERACTIVE COMPUTER SYSTEMS;
NETWORK PROTOCOLS;
RELIABILITY ANALYSIS;
SECURITY SYSTEMS;
NETWORK SECURITY;
|
EID: 74049152238
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IAS.2009.320 Document Type: Conference Paper |
Times cited : (21)
|
References (6)
|