What people are saying - Write a review
We haven't found any reviews in the usual places.
On the Structure of Delegation Networks
Two Facets of Authentication
14 other sections not shown
AAPA abstract events algorithm Alice Alice and Bob analysis applied assume assumptions attack auth Authentication Protocol BAN logic belief logics bisimulation certificates Certs channel components Computer Security concurrency control concurrent condition consider covert channels cryptographic protocols database decrypt defined Definition delegation network described downgrade encryption example execution finite Flow formal formula function goals high reader honest agents honest participants identify implementation inference rules init intruder issuer Lemma lottery low writers model checking multilevel secure MuSig Needham-Schroeder node non-repudiation nonces paper performance principal probabilistic problem proof public key queries reduction relation result return tuples satisfies secret Section Security and Privacy security policies security properties security protocols semantics session specification strand strategy subnetwork techniques Theorem ticket numbers tion tocol trace transactions trusted third party values variables vendor verification Woo and Lam WSBC