The Scope of a Logic of Authentication.
Michael BurrowsMartín AbadiRoger M. NeedhamPublished in: Distributed Computing And Cryptography (1989)
Keyphrases
- logic programming
- classical logic
- multi valued
- data encryption
- modal logic
- predicate logic
- biometric authentication
- neural network
- artificial intelligence
- identity authentication
- asynchronous circuits
- authentication protocol
- delay insensitive
- natural deduction
- identity management
- image authentication
- formal theory
- set theory
- database
- security mechanisms
- automated reasoning
- security requirements
- databases