next up previous
Up: Formal Analysis of IP Previous: Acknowledgments

References

1
M. Abadi and M. Tuttle.
A semantics for a logic of authentication.
In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, pages 201-216. ACM Press, 1991.

2
R. Atkinson.
IP Encapsulating Security Payload (ESP).
Network Working Group Request for Comments: 1827, August 1996.

3
Michael Burrows, Martin Abadi, and Roger Needham.
A logic of authentication.
ACM Transactions on Computer Systems, 8(1), Feb. 1990.

4
L. Gong and R. Needhamand R. Yahalom.
Reasoning about belief in cryptographic protocols.
In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1990.

5
S. Kent and R. Atkinson.
IP Authentication Header.
Network Working Group, Internet Draft: draft-ietf-ipsec-auth-05.txt, July 1997.

6
S. Kent and R. Atkinson.
IP Encapsulating Security Payload (ESP).
Network Working Group, Internet Draft: draft-ietf-ipsec-esp-04.txt, July 1997.

7
S. Kent and R. Atkinson.
Security Architecture for the Internet Protocol.
Network Working Group, Internet Draft: draft-ietf-ipsec-.txt, 1997.

8
D. Maughan, M. Schertler, M. Schneider, and J. Turner.
Internet Security Associations and Key Management Protocol (ISAKMP).
IPSEC Working Group, Internet Draft, February 1997.

9
Tom Melham.
Automating recursive type definitions in higher order logic.
In G. Birtwhistle and P.A Subrahmanyam, editors, Current Trends in Hardware Verification and Automated Theorem Proving, pages 341-386. Springer-Verlag, 1989.

10
C. Perkins.
IP Mobility Support.
Network Working Group Request for Comments: 2002, October 1996.

11
Bruce Schneier.
Applied Cryptography.
John Wiley & Sons, Inc, 1994.

12
Tom Schubert and Sarah Mocas.
A mechanized logic for secure key escrow protocol verification.
In International Workshop on the HOL Theorem Proving System and its Applications. Springer-Verlag, August 1995.

13
Paul F. Syverson and Paul C. van Oorschot.
On unifying some cryptographic protocol logics.
In Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, May 1994.

14
P. vanOorschot.
Extending cryptographic logics of cryptographic logics of belief to key agreement protocols.
In Proceedings of the First ACM Conference on Computers and Communications Security, pages 232-243, 1993.