|

Applications of Term Rewriting to Cryptographic Protocol Analysis
by J. Millen.
Electronic Notes in Theoretical Computer Science, Volume 36. From The 3rd International Workshop on Rewriting Logic and its Applications. Edited by Kokichi Futatsugi. Elsevier Science. September, 2000.
Abstract
Cryptographic protocols for key distribution and authentication play an important role in
Internet security. Certain flaws in these protocols can be discovered using term rewriting
models to express the protocol, the malicious network environment, and vulnerability search
strategies.
BibTEX Entry
@inproceedings{wrla,
AUTHOR = {{J.} Millen},
TITLE = {Applications of Term Rewriting to Cryptographic Protocol Analysis},
BOOKTITLE = {The 3rd International Workshop on Rewriting Logic and its Applications},
YEAR = {2000},
EDITOR = {Kokichi Futatsugi},
SERIES = {Electronic Notes in Theoretical Computer Science},
VOLUME = {36},
MONTH = {September},
PUBLISHER = {Elsevier Science},
URL = {http://www.csl.sri.com/papers/wrla/}
}
Files
|
|