Yahalom (protocol)

Known as: Yahalom 
Yahalom is an authentication and secure key-sharing protocol designed for use on an insecure network such as the Internet. Yahalom uses a trusted… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1991-2016
024619912016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
Logic-based formal analysis methods are the efficient methods for analyzing the security of cryptography protocols. The paper… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment… (More)
  • table 1
Is this relevant?
2006
2006
Symbolic secrecy of exchanged keys is arguably one of the most important notions of secrecy shown with automated proof tools. It… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2003
2003
We present a method based on abstract interpretation for verifying secrecy properties of cryptographic protocols. Our method… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Informal justifications of security protocols involve arguing backwards that various events are impossible. Inductive definitions… (More)
Is this relevant?
1994
1994
We reveal instances of unsoundness, incompleteness, and redundancy in the cryptographic protocol analysis logic of Gong, Needham… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by… (More)
Is this relevant?