- [1] Burrows, M., Abadi, M., and Needham, R. A logic of authentication. In Proceedings of the 12th Symposium on Operating System Principles (Litchfield Park, Arizona, Dec., 1989). ACM, 1989, pp. 1-13. Google ScholarDigital Library
- [2] Nessett, D. Factors affecting distributed system security. IEEE Trans. Soft. Eng., SE-13, (Feb. 1987) 223-248. Google ScholarDigital Library
Index Terms
- A critique of the Burrows, Abadi and Needham logic
Recommendations
Protocol Derivation System for the Needham-Schroeder family
A framework consisting of the Protocol Derivation System PDS and the Protocol Composition Logic PCL has been recently proposed by Datta et al. for the design and analysis of a secure composition of cryptographic protocols. However, the PDS in this ...
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the symbolic model checker for ...
A computational analysis of the Needham-Schroeder-(Lowe) protocol
The Needham Schroeder protocol and its repaired verdion due to Lowe are the main test cases used by symbolic methods for cryptographic protocol analysis. In this paper we proved the first computational analysis of the protocol. We start by translating ...
Comments