×
Abstract. The security of electronic communication relies to a great extent on the security of authen- tication protocols used to distribute cryptographic ...
Jun 15, 2005 · In this paper we introduce a formal method which allows to detect the possibility of certain replay and interleaving attacks. By using our ...
SG Logic - A Formal Analysis Technique for Authentication Protocols. Sigrid Giirgens *. GMD - German National Research Center for Information Technology.
A novel formal logic for formal analysis of timeliness in non-repudiation protocols. Abstract · Efficient Non-interactive Deniable Authentication Protocols.
The security of electronic communication relies to a great extent on the security of authen- tication protocols used to distribute cryptographic keys.
Home · Fraunhofer-Gesellschaft · Konferenzschrift · SG logic - a formal analysis technique for authentication protocols.
This technique allows formulate of an expressive logical encoding of the authentication mechanisms underpinning distributed resource-aware authorization ...
People also ask
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of ...
Apr 7, 1997 · SG Logic- A Formal Analysis Technique for Authentication Protocols · Author Picture Sigrid Gürgens. Pages 159–176. 1. Metrics. Total Citations1.
S. Gürgens, SG logic ??? a formal analysis technique for authentication protocols, LNCS, vol.1316, pp.159-176, 1997.