Burrows–Abadi–Needham logic

Known as: BAN logic analysis of the Wide Mouth Frog protocol, Burrows-Abadi-Needham logic, BAN-Logic 
Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1990-2018
010203019902018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Nowadays with widespread employment of the Internet, servers provide various services for legal users. The vital issue in client… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2016
2016
The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent… (More)
  • table II
  • table I
  • table III
  • figure 1
  • figure 2
Is this relevant?
2016
2016
Wireless sensor networks can be deployed in any attended or unattended environments like environmental monitoring, agriculture… (More)
  • figure 1
  • figure 2
Is this relevant?
2010
2010
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes… (More)
  • table I
  • table II
Is this relevant?
2007
2007
BAN logic is a propositional logic of knowledge for the verification of cryptographic protocols. While BAN logic has been… (More)
Is this relevant?
1999
1999
Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to… (More)
  • table 1
Is this relevant?
1995
1995
The cryptographic protocol analysis logic of Gong, Needham and Yahalom (GNY) ooers signiicant advantages over its predecessor… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
In the past few years a lot of attention has been paid to the use of special logics to analyae cryptographic protocols, foremost… (More)
Is this relevant?
1993
1993
Boyd and Mao (“On a Limitation of BAN Logic”, in these proceedings) suggest that it is easy to use the authentication logic of… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
In a recent paper [1], Burrows, Abadi and Needham propose a logic for the analysis of authentication protocols. Formulated as a… (More)
Is this relevant?