Australian Software Engineering Conference (ASWEC'06) 2006
DOI: 10.1109/aswec.2006.30
|View full text |Cite
|
Sign up to set email alerts
|

Formally analysing a security protocol for replay attacks

Abstract: The Kerberos-One-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 27 publications
(18 reference statements)
0
2
0
Order By: Relevance
“…In the work of Benjamin et al [22] a method for inspecting replay attacks on Kerberos protocol authentication was proposed in which the protocol was specified using Object-Z.…”
Section: F Related Workmentioning
confidence: 99%
“…In the work of Benjamin et al [22] a method for inspecting replay attacks on Kerberos protocol authentication was proposed in which the protocol was specified using Object-Z.…”
Section: F Related Workmentioning
confidence: 99%
“…Benjamin [8] proposes a method for the inspection of replay attacks on Kerberos authentication protocol in which the protocol was specified by using the Object-Z.…”
Section: Related Workmentioning
confidence: 99%