A Limitation of BAN Logic Analysis on a Man-in-the-middle Attack
暂无分享,去创建一个
[1] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[2] Einar Snekkenes,et al. Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol , 2004, Journal of Cryptology.
[3] Martín Abadi,et al. Explicit Communication Revisited: Two New Attacks on Authentication Protocols , 1997, IEEE Trans. Software Eng..
[4] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Colin Boyd,et al. On a Limitation of BAN Logic , 1994, EUROCRYPT.
[6] Paul C. van Oorschot,et al. An Alternate Explanation of two BAN-logic "failures" , 1994, EUROCRYPT.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Jan Wessels. APPLICATIONS OF BAN-LOGIC , 2001 .
[9] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.