Login / Signup
Formal analysis of Kerberos 5.
Frederick Butler
Iliano Cervesato
Aaron D. Jaggard
Andre Scedrov
Christopher Walstad
Published in:
Theor. Comput. Sci. (2006)
Keyphrases
</>
formal analysis
secret key
formal methods
authentication protocol
security analysis
agent model
artificial intelligence
databases
mutual authentication
authentication mechanism
ban logic