G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …