Sign in

Formal analysis of Kerberos 5.

Frederick ButlerIliano CervesatoAaron D. JaggardAndre ScedrovChristopher Walstad
Published in: Theor. Comput. Sci. (2006)
Keyphrases
  • formal analysis
  • secret key
  • formal methods
  • authentication protocol
  • security analysis
  • agent model
  • artificial intelligence
  • databases
  • mutual authentication
  • authentication mechanism
  • ban logic