Login / Signup

On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.

Shouhuai XuGendu ZhangHong Zhu
Published in: ACM SIGOPS Oper. Syst. Rev. (1997)
Keyphrases
  • cryptographic protocols
  • expressive power
  • database
  • authentication protocol
  • security properties
  • information systems
  • database systems
  • similarity measure
  • standard model