Catherine Meadows. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo, editors, Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Volume 1146 of Lecture Notes in Computer Science, pages 351-364, Springer, 1996. [doi]
@inproceedings{Meadows96:2, title = {Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches}, author = {Catherine Meadows}, year = {1996}, doi = {10.1007/3-540-61770-1_46}, url = {http://dx.doi.org/10.1007/3-540-61770-1_46}, tags = {protocol, systematic-approach}, researchr = {https://researchr.org/publication/Meadows96%3A2}, cites = {0}, citedby = {0}, pages = {351-364}, booktitle = {Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, volume = {1146}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-61770-1}, }