-
3
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications, Vol. 1, No. 1 (1994) pp. 25-31.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
4
-
-
0005078946
-
Entity authentication and key distribution
-
volume to appear, Springer-Verlag
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, Advances in Cryptology - CRYPTO '93, volume to appear, Springer-Verlag (1994).
-
(1994)
Advances in Cryptology - CRYPTO '93
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Advances in Cryptology - CRYPTO '91, (Joan Feigenbaum, ed.), Springer Verlag, Berlin
-
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung, Systematic design of two-party authentication protocols, Advances in Cryptology - CRYPTO '91, (Joan Feigenbaum, ed.), Lecture Notes in Computer Science, Springer Verlag, Berlin, 572 (1992).
-
(1992)
Lecture Notes in Computer Science
, vol.572
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
6
-
-
0025388480
-
A security scheme for resource sharing over a network
-
J. Burns and C.J. Mitchell, A security scheme for resource sharing over a network, Computers and Security, Vol. 9 (1990) pp. 67-76.
-
(1990)
Computers and Security
, vol.9
, pp. 67-76
-
-
Burns, J.1
Mitchell, C.J.2
-
7
-
-
0025386404
-
A Logic of Authentication
-
Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
-
Michael Burrows, Martín Abadi, and Roger Needham, A Logic of Authentication, Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, Vol. 8, No. 1 (1990) pp. 18-36. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0011936788
-
-
Michael Burrows, Martín Abadi, and Roger Needham, Rejoinder to Nessett, Operating Systems Review, Vol. 24, No. 2 (1990) pp. 39-40.
-
(1990)
Operating Systems Review
, vol.24
, Issue.2
, pp. 39-40
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
Nessett, R.T.4
-
9
-
-
84929273746
-
Untraceable electronic cash
-
(S. Goldwasser, ed.), Springer-Verlag, LNCS 403
-
D. Chaum, A. Fiat, and M. Naor, Untraceable electronic cash, Advances in Cryptology - CRYPTO '88, (S. Goldwasser, ed.), Springer-Verlag, LNCS 403 (1990) pp. 319-327.
-
(1990)
Advances in Cryptology - CRYPTO '88
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
11
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener, Authentication and authenticated key exchanges, Designs, Codes, and Cryptography, Vol. 2 (1992) pp. 107-125.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
12
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, Vol. 29, No. 2 (1983) pp. 198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
13
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
Taher ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31, No. 4 (1985) pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
14
-
-
0003198753
-
Logics of Time and Computation
-
nd edition, CSLI Publications, Stanford
-
nd edition, CSLI Lecture Notes, CSLI Publications, Stanford, 7 (1992).
-
(1992)
CSLI Lecture Notes
, vol.7
-
-
Goldblatt, R.1
-
15
-
-
0037643821
-
-
Research Report 57, Digital systems research Center, April
-
Leslie Lamport, A Temporal Logic of Action, Research Report 57, Digital systems research Center, (April 1990).
-
(1990)
A Temporal Logic of Action
-
-
Lamport, L.1
-
16
-
-
0026152198
-
A system for the specification and analysis of key management protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
C. Meadows, A system for the specification and analysis of key management protocols, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California, (1991) pp. 182-195.
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 182-195
-
-
Meadows, C.1
-
17
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows, Applying formal methods to the analysis of a key management protocol, Journal of Computer Security, Vol. 1 (1992) pp. 5-53.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
18
-
-
0004256761
-
-
Ph.d. thesis, Georgia Institute of Technology
-
M. J. Merritt, Cryptographic Protocols, Ph.d. thesis, Georgia Institute of Technology (1983).
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.J.1
-
19
-
-
0002917347
-
Kerberos authentication and authorization system
-
MIT, Cambridge, Mass. July
-
S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer, Kerberos authentication and authorization system, in Project Athena Technical Plan. MIT, Cambridge, Mass. (July 1987).
-
(1987)
Project Athena Technical Plan
-
-
Miller, S.P.1
Neuman, C.2
Schiller, J.I.3
Saltzer, J.H.4
-
20
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
D. M. Nessett, A critique of the Burrows, Abadi, and Needham logic, Operating Systems Review, Vol. 24, No. 2 (1990) pp. 35-38.
-
(1990)
Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
21
-
-
0026851843
-
On message integrity in cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
S. G. Stubblebine and V. D. Gligor, On message integrity in cryptographic protocols, Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California (1992) pp. 85-104.
-
(1992)
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 85-104
-
-
Stubblebine, S.G.1
Gligor, V.D.2
-
22
-
-
0027227136
-
A logical language for specifying cryptographic protocol requirements
-
IEEE Computer Society Press, Los Alamitos, California
-
Paul Syverson and Catherine Meadows, A logical language for specifying cryptographic protocol requirements, Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California (1993) pp. 165-177.
-
(1993)
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 165-177
-
-
Syverson, P.1
Meadows, C.2
-
23
-
-
1442341305
-
Formal requirements for key distribution protocols
-
University of Perugia, Italy, Final proceedings forthcoming from Springer-Verlag
-
Paul Syverson and Catherine Meadows, Formal requirements for key distribution protocols, Pre-proceedings of EUROCRYPT '94, University of Perugia, Italy, (1994) pp. 325-337. Final proceedings forthcoming from Springer-Verlag.
-
(1994)
Pre-proceedings of EUROCRYPT '94
, pp. 325-337
-
-
Syverson, P.1
Meadows, C.2
-
26
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
Paul F. Syverson, On key distribution protocols for repeated authentication, Operating Systems Review, Vol. 27, No. 4 (1993) pp. 24-30.
-
(1993)
Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.F.1
-
27
-
-
0003537268
-
Separating the specification and implementation phases in cryptology
-
Springer-Verlag LMCS 638
-
M.-J. Toussaint, Separating the specification and implementation phases in cryptology, Computer Security - ESORICS 92, Springer-Verlag LMCS 638 (1992) pp. 77-102.
-
(1992)
Computer Security - ESORICS 92
, pp. 77-102
-
-
Toussaint, M.-J.1
-
28
-
-
26044450915
-
The Logic of Time
-
Kluwer Academic Publishers, Dordrecht, The Netherlands, second edition
-
Johan van Bentham, The Logic of Time, Synthese Library, Vol. 156, Kluwer Academic Publishers, Dordrecht, The Netherlands, second edition, (1991).
-
(1991)
Synthese Library
, vol.156
-
-
Van Bentham, J.1
-
30
-
-
84974746841
-
Optimality of asynchronous two-party secure data-exchange protocols
-
R. Yahalom, Optimality of asynchronous two-party secure data-exchange protocols, Journal of Computer Security, Vol. 2, No. 2-3 (1994) pp. 191-209.
-
(1994)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 191-209
-
-
Yahalom, R.1
|