Analysis of cryptographic protocols using logics of belief: an overview
When designing a cryptographic protocol or explaining it, one often uses arguments such as ``since this message was signed by machine B, machine A can be sure it came from B`` in informal proofs justifying how the protocol works. Since it is, in such informal proofs, often easy to overlook an essen...
| Published in: | Journal of Telecommunications and Information Technology |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
National Institute of Telecommunications
2002-12-01
|
| Subjects: | |
| Online Access: | https://jtit.pl/jtit/article/view/145 |
