This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi, M., and Needham, R., ‘Prudent engineering practice for cryptographic protocols,’ IEEE Transactions on Software Engineering, vol. 22,no. 1, 1996, pp. 6–15.
Brackin, S.H., ‘A HOL extension of GNY for automatically analysing cryptographic protocols,’ in 9th Computer Security Foundations Workshop. IEEE Computer Society Press, 1996, pp. 62–75.
Burrows, M., Abadi, M., and Needham, R.M., ‘A logic of authentication,’ Proceedings of the Royal Society of London, vol. 426, 1989, pp. 233–271.
Dietrich, S., A formal analysis of the secure sockets layer protocol. Ph.D. thesis, 1997, Adelphi University, Garden City, New York.
Gürgens, S., and Rudolph, C., ‘Security analysis of (un-)fair non-repudiation protocols.’ In A. Abdallah, P. Ryan And S. Schneider, S. (eds.), Formal aspects of security 2002. Royal Holloway College, University of London.
LOWE, G., ‘Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR.’ In T. Margaria and B. Steffen, (eds.), ‘Tools and Algorithms for the Construction and Analysis of Systems,’ Second International Workshop, TACAS’ 96, Lecture Notes in Computer Science 1055, pp. 147–166., Springer, 1996.
Paulson, L.C., ‘The inductive approach to verifying cryptographic protocols,’ J. Computer Security, vol. 6, 1998, pp. 85–128.
Paulson, L.C., ‘Relations between secrets: two formal analyses of the Yahalom protocol,’ J. Computer Security, vol. 9,no. 3, 2001, pp. 197–216.
Zhou, J., and Gollmann, D., ‘A fair non-repudiation protocol,’ in Proc. of the 15th IEEE Symposium on Security and Privacy, 1996, pp 55–61., IEEE Computer Society Press.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Paulson, L.C. (2004). The Descent of BAN. In: Herbert, A., Jones, K.S. (eds) Computer Systems. Monographs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/0-387-21821-1_33
Download citation
DOI: https://doi.org/10.1007/0-387-21821-1_33
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-20170-2
Online ISBN: 978-0-387-21821-2
eBook Packages: Springer Book Archive