Skip to search formSkip to main contentSkip to account menu

Burrows–Abadi–Needham logic

Known as: BAN logic analysis of the Wide Mouth Frog protocol, BAN Logic, Burrows-Abadi-Needham logic 
Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor… 
Highly Cited
2014
Highly Cited
2014
User authentication is an important security issue for network based services. Multi-server authentication scheme resolves the… 
2012
2012
This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN… 
Highly Cited
2010
Highly Cited
2010
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes… 
2009
2009
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed… 
Highly Cited
2008
Highly Cited
2008
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A… 
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
2003
2003
Security protocols play an important role in modern communications. However, security protocol development is a delicate task… 
1999
1999
  • D. Monniaux
  • 1999
  • Corpus ID: 11283134
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In… 
1991
1991
  • E. Snekkenes
  • 1991
  • Corpus ID: 19626688
The BAN approach to analysis of cryptographic protocols (M. Burrows et al., 1988) transforms a correctness requirement into a…