Results 181 to 188 of about 3,562 (188)
Some of the next articles are maybe not open access.
Matrix-based authentication protocol for RFID and BAN logic analysis
Journal of Computer Applications, 2013Hongjing LI, Dan LIU
openaire +1 more source
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
2008 ISECS International Colloquium on Computing, Communication, Control, and Management, 2008Cai Qingling, Zhan Yiju, Wang Yonghua
openaire +1 more source
Analyzing MORNeS Protocol for Secure Key Exchange with BAN Logic
2025 International Electronics Symposium (IES)Khairil Ahmad +3 more
openaire +1 more source
Formal Verification of Consumer Remote Sim Provisioning Common Mutual Authentication using BAN Logic
2025 1st International Conference on Consumer Technology (ICCT-Pacific)Jhury Kevin Lastre +4 more
openaire +1 more source
Knowledge in security protocols: an operational semantics for BAN logic
1999Bleeker, A.M., Meertens, L.G.L.T.
openaire +1 more source
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic
Gunwoo Kim, Yongho Ko, Ilsun Youopenaire +1 more source
BAN Logic is not 'Sound', Constructing Epistemic Logics for Security is Difficult
2006openaire +1 more source

