Analyzing encryption protocols using formal verification techniques

1Citations
Citations of this article
51Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Much work has been done in the area of analyzing encryption algorithms, such as DES [Dav 81.Bri 85.BMP 861]. A vast amount of work has also been expended on formally verifying com- munication protocols [IEE 82,STE 82,RW 83.LS 84.Hol 871]. In contrast, very little work has been devoted to the analysis and formal verification of encryption protocols.

Cite

CITATION STYLE

APA

Kemmerer, R. A. (1988). Analyzing encryption protocols using formal verification techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 293 LNCS, pp. 289–305). Springer Verlag. https://doi.org/10.1007/3-540-48184-2_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free