Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,380,547 papers from all fields of science
Search
Sign In
Create Free Account
Burrows–Abadi–Needham logic
Known as:
BAN logic analysis of the Wide Mouth Frog protocol
, BAN Logic
, Burrows-Abadi-Needham logic
Expand
Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Andrew Project
Authentication
Axiomatic system
Cryptographic protocol
Expand
Broader (1)
Automated theorem proving
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen
,
Jue-Sam Chou
,
Hung-Shen Wu
IACR Cryptology ePrint Archive
2016
Corpus ID: 18849710
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor…
Expand
Highly Cited
2014
Highly Cited
2014
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
Xiong Li
,
J. Niu
,
S. Kumari
,
Junguo Liao
,
W. Liang
Wireless personal communications
2014
Corpus ID: 4009277
User authentication is an important security issue for network based services. Multi-server authentication scheme resolves the…
Expand
2012
2012
The Security Analysis on Otway-Rees Protocol Based on BAN Logic
Kening Liu
,
J. Ye
,
Yinglian Wang
Fourth International Conference on Computational…
2012
Corpus ID: 37288658
This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN…
Expand
Highly Cited
2010
Highly Cited
2010
New dynamic ID authentication scheme using smart cards
Jia-Lun Tsai
,
Tzong-Chen Wu
,
Kuo-Yu Tsai
International Journal of Communication Systems
2010
Corpus ID: 13539873
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes…
Expand
2009
2009
Formal Analysis for Security of Otway-Rees Protocol with BAN Logic
Tingyuan Li
,
Xiaodong Liu
,
Zhiguang Qin
,
Xuanfang Zhang
First International Workshop on Database…
2009
Corpus ID: 40260221
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
2003
2003
Automated design of security protocols
Hao Chen
,
John A. Clark
,
J. Jacob
The Congress on Evolutionary Computation, . CEC…
2003
Corpus ID: 1002611
Security protocols play an important role in modern communications. However, security protocol development is a delicate task…
Expand
1999
1999
Decision procedures for the analysis of cryptographic protocols by logics of belief
D. Monniaux
Proceedings of the 12th IEEE Computer Security…
1999
Corpus ID: 11283134
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In…
Expand
1991
1991
Exploring the BAN approach to protocol analysis
E. Snekkenes
Proceedings. IEEE Computer Society Symposium on…
1991
Corpus ID: 19626688
The BAN approach to analysis of cryptographic protocols (M. Burrows et al., 1988) transforms a correctness requirement into a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE