## A logic of authentication (1990)

### Cached

### Download Links

- [cs.ucsb.edu]
- [www.securitytechnet.com]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [www.cs.cmu.edu]
- [people.cs.vt.edu]
- [people.cs.vt.edu]
- [www.cse.ucsc.edu]
- [www.soe.ucsc.edu]
- [users.soe.ucsc.edu]
- [pa.bell-labs.com]
- [gatekeeper.dec.com]
- [pa.bell-labs.com]
- [www.cs.bris.ac.uk]
- [gatekeeper.dec.com]
- [www.cs.bham.ac.uk]
- [www.cse.psu.edu]
- [apotheca.hpl.hp.com]
- [www-db.stanford.edu]
- [cs.unomaha.edu]
- [cs.ucsb.edu]
- [www.cs.iastate.edu]
- [www.eecs.berkeley.edu]
- [www.stanford.edu]
- [www.cs.ubc.ca]
- [www.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- [www.cs.ubc.ca]
- [carlstrom.com]
- [www.cse.psu.edu]
- [www.stanford.edu]
- [www.hpl.hp.com]
- DBLP

### Other Repositories/Bibliography

by
Michael Burrows
,
Martín Abadi
,
Roger Needham

Venue: | ACM TRANSACTIONS ON COMPUTER SYSTEMS |

Citations: | 1132 - 25 self |