Reconciling Information Exchange and Confidentiality — A Formal Approach

Front Cover
Wouter Teepe, 2007
0 Reviews
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction
3
Preliminaries
17
Cryptographic Hash Functions
29
Authentication Logics
47
Unsoundness of BAN logic
55
Extending GNY Logic
67
Information Designators
81
Knowledge Authentication
101
shown as a colored surface with l 4
152
Conclusion
171
A Remarks to Authentication Logics
179
Remarks to Knowledge Authentication
187
E Notation
207
Author Index
226
About the Author
234
Copyright

Manytomany Protocols T2
145

Common terms and phrases

Bibliographic information