Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches

Catherine Meadows. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo, editors, Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Volume 1146 of Lecture Notes in Computer Science, pages 351-364, Springer, 1996. [doi]

@inproceedings{Meadows96:2,
  title = {Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches},
  author = {Catherine Meadows},
  year = {1996},
  doi = {10.1007/3-540-61770-1_46},
  url = {http://dx.doi.org/10.1007/3-540-61770-1_46},
  tags = {protocol, systematic-approach},
  researchr = {https://researchr.org/publication/Meadows96%3A2},
  cites = {0},
  citedby = {0},
  pages = {351-364},
  booktitle = {Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo},
  volume = {1146},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-61770-1},
}