메뉴 건너뛰기




Volumn 113, Issue , 2005, Pages 744-747

The study on the application of BAN logic in formal analysis of authentication protocols

Author keywords

authentication protocols; BAN logic; formalization analysis

Indexed keywords

AUTHENTICATION PROTOCOLS; BAN LOGIC; COMPARATIVE STUDIES; CRITICAL ISSUES; FORMAL ANALYSIS; IN-NETWORK; SAFETY SYSTEM;

EID: 77953856139     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089551.1089685     Document Type: Conference Paper
Times cited : (24)

References (8)
  • 3
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • J Dec
    • R.M. Needham and M.D. Schroeder, Using Encryption for Authentication in Large Networks of Comput ers[J], Communications of ACM,v.21,n.12,Dec 1978: 993-999.
    • (1978) Communications of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 4
    • 0023247970 scopus 로고
    • Efficient and Timely Mutual Authentication
    • Dec
    • D. Otway and O.Rees, Efficient and Timely Mutual Authentication,Operating Systems Review, v.21,n.1,Dec 1987: 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.