A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Adding time to a logic of authentication
1993
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
In [BAN89] Burrows, Abadi, and Needham presented a logic (BAN) for analyzing cryptographic protocols in terms of belief. This logic is quite useful in uncovering flaws in protocols; however, it also has produced confusion and controversy. Much of the confusion was cleared up when Abadi and Turtle provided a semantics for a version of that logic (AT) in [AT91] . In this paper we present a protocol to show that both BAN and AT are not expressive enough to capture all of the kinds of flaws that
doi:10.1145/168588.168600
dblp:conf/ccs/Syverson93
fatcat:6qrn2raoxbdgxcuz66u6cqo6am