Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches

Catherine Meadows. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo, editors, Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Volume 1146 of Lecture Notes in Computer Science, pages 351-364, Springer, 1996. [doi]

Abstract

Abstract is missing.