Much work has been done in the area of analyzing encryption algorithms, such as DES [Dav 81.Bri 85.BMP 861]. A vast amount of work has also been expended on formally verifying com- munication protocols [IEE 82,STE 82,RW 83.LS 84.Hol 871]. In contrast, very little work has been devoted to the analysis and formal verification of encryption protocols.
CITATION STYLE
Kemmerer, R. A. (1988). Analyzing encryption protocols using formal verification techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 293 LNCS, pp. 289–305). Springer Verlag. https://doi.org/10.1007/3-540-48184-2_26
Mendeley helps you to discover research relevant for your work.