Login / Signup
A Logic of Authentication.
Michael Burrows
Martín Abadi
Roger M. Needham
Published in:
ACM Trans. Comput. Syst. (1990)
Keyphrases
</>
logic programming
classical logic
computational properties
authentication scheme
multi valued
biometric authentication
predicate logic
user authentication
identity management
proof theory
sound and complete axiomatization
data sets
security analysis
identity authentication
delay insensitive