Advertisement

The Descent of BAN

  • Lawrence C. Paulson
Chapter
  • 220 Downloads
Part of the Monographs in Computer Science book series (MCS)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abadi, M., and Needham, R., ‘Prudent engineering practice for cryptographic protocols,’ IEEE Transactions on Software Engineering, vol. 22,no. 1, 1996, pp. 6–15.CrossRefGoogle Scholar
  2. 2.
    Brackin, S.H., ‘A HOL extension of GNY for automatically analysing cryptographic protocols,’ in 9th Computer Security Foundations Workshop. IEEE Computer Society Press, 1996, pp. 62–75.Google Scholar
  3. 3.
    Burrows, M., Abadi, M., and Needham, R.M., ‘A logic of authentication,’ Proceedings of the Royal Society of London, vol. 426, 1989, pp. 233–271.MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Dietrich, S., A formal analysis of the secure sockets layer protocol. Ph.D. thesis, 1997, Adelphi University, Garden City, New York.Google Scholar
  5. 5.
    Gürgens, S., and Rudolph, C., ‘Security analysis of (un-)fair non-repudiation protocols.’ In A. Abdallah, P. Ryan And S. Schneider, S. (eds.), Formal aspects of security 2002. Royal Holloway College, University of London.Google Scholar
  6. 6.
    LOWE, G., ‘Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR.’ In T. Margaria and B. Steffen, (eds.), ‘Tools and Algorithms for the Construction and Analysis of Systems,’ Second International Workshop, TACAS’ 96, Lecture Notes in Computer Science 1055, pp. 147–166., Springer, 1996.Google Scholar
  7. 7.
    Paulson, L.C., ‘The inductive approach to verifying cryptographic protocols,’ J. Computer Security, vol. 6, 1998, pp. 85–128.Google Scholar
  8. 8.
    Paulson, L.C., ‘Relations between secrets: two formal analyses of the Yahalom protocol,’ J. Computer Security, vol. 9,no. 3, 2001, pp. 197–216.MathSciNetGoogle Scholar
  9. 9.
    Zhou, J., and Gollmann, D., ‘A fair non-repudiation protocol,’ in Proc. of the 15th IEEE Symposium on Security and Privacy, 1996, pp 55–61., IEEE Computer Society Press.Google Scholar

Copyright information

© Springer-Verlag New York, Inc. 2004

Authors and Affiliations

  • Lawrence C. Paulson

There are no affiliations available

Personalised recommendations