The Community for Technology Leaders
RSS Icon
Issue No.01 - January (1996 vol.22)
pp: 6-15
<p><b>Abstract</b>—We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.</p><p>Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
MartÍn Abadi, Roger Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering, vol.22, no. 1, pp. 6-15, January 1996, doi:10.1109/32.481513
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool