-
1
-
-
0027667638
-
"A calculus for access control in distributed systems,"
-
vol. 15, no. 4, pp. 706-734, Sept. 1993.
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, "A calculus for access control in distributed systems," ACM Trans. Programming Languages and Systems, vol. 15, no. 4, pp. 706-734, Sept. 1993.
-
ACM Trans. Programming Languages and Systems
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0000874415
-
"Limitations of the Kerberos authentication system,"
-
vol. 20, no. 5, pp. 119-132, Oct. 1990.
-
S.M. Bellovin and M. Merritt, "Limitations of the Kerberos authentication system," Computer Comm. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
-
Computer Comm. Review
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
84958778419
-
"On a limitation of BAN logic,"
-
93, pp. 240-247, Springer-Verlag, 1993.
-
C. Boyd and W. Mao, "On a limitation of BAN logic," Proc. Advances in Cryptology: Eurocrypt '93, pp. 240-247, Springer-Verlag, 1993.
-
Proc. Advances in Cryptology: Eurocrypt '
-
-
Boyd, C.1
Mao, W.2
-
4
-
-
0004215976
-
"A logic of authentication,"
-
vol. 426, pp. 233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report no. 39, Feb. 1989.
-
M. Burrows, M. Abadi, and R.M. Needham, "A logic of authentication," Proc. Royal Soc. London A, vol. 426, pp. 233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report no. 39, Feb. 1989.
-
Proc. Royal Soc. London a
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
5
-
-
33747378904
-
-
1TT Blue Book, Recommendation X.509 and ISO 9594- 8: The Directory-Authentication Framework. Geneva, Mar. 1988.
-
CCITT. CC1TT Blue Book, Recommendation X.509 and ISO 9594- 8: The Directory-Authentication Framework. Geneva, Mar. 1988.
-
-
-
Ccitt, C.C.1
-
6
-
-
84976665942
-
"Timestamps in key distribution protocols,"
-
vol. 24, no. 8, pp. 533-536, Aug. 1981.
-
D.E. Denning and G.M. Sacco, "Timestamps in key distribution protocols," CACM, vol. 24, no. 8, pp. 533-536, Aug. 1981.
-
CACM
-
-
Denning, D.E.1
Sacco, G.M.2
-
7
-
-
0023569922
-
"Zero knowledge proofs of identity,"
-
19th Ann. ACM Symp. Theory of Computing, pp. 210-217,1987.
-
[7J U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," Proc. 19th Ann. ACM Symp. Theory of Computing, pp. 210-217,1987.
-
Proc.
-
-
Feige, J.U.1
Fiat, A.2
Shamir, A.3
-
8
-
-
0003370741
-
"A security risk of depending on synchronized clocks,"
-
vol. 26, no. 1, pp. 49-54, Jan. 1992.
-
L. Gong, "A security risk of depending on synchronized clocks," Operating Systems Review, vol. 26, no. 1, pp. 49-54, Jan. 1992.
-
Operating Systems Review
-
-
Gong, L.1
-
11
-
-
33747369708
-
-
[Ill K.E.B. Hickman, "The SSL protocol," RFC, Netscape Communications Corp., version of Oct. 31,1994.
-
"The SSL protocol," RFC, Netscape Communications Corp., version of Oct. 31,1994
-
-
Hickman, I.K.E.1
-
12
-
-
84976834054
-
"Authentication in distributed systems: Theory and practice,"
-
vol. 10, no. 4, pp. 265-310, Nov. 1992.
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Computer Systems, vol. 10, no. 4, pp. 265-310, Nov. 1992.
-
ACM Trans. Computer Systems
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
13
-
-
0042664779
-
"Authentication in distributed systems: A bibliography,"
-
vol. 27, no. 4, pp. 31-41, Oct. 1993.
-
A. Liebl. "Authentication in distributed systems: A bibliography," Operating Systems Review, vol. 27, no. 4, pp. 31-41, Oct. 1993.
-
Operating Systems Review
-
-
Liebl, A.1
-
14
-
-
0024749621
-
"Secure communication in internet environments: A hierarchical key management scheme for end-to-end encryption,"
-
vol. 37, no. 10, pp. 1,014-1,023, Oct. 1989.
-
W.P. Lu and M.K. Sundareshan, "Secure communication in internet environments: A hierarchical key management scheme for end-to-end encryption," IEEE Trans. Comm., vol. 37, no. 10, pp. 1,014-1,023, Oct. 1989.
-
IEEE Trans. Comm.
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
15
-
-
0026853767
-
"Enhanced protocols for hierarchical encryption key management for secure communication in internet environments,"
-
vol. 40, no. 4, pp. 658- 660, Apr. 1992.
-
W.P. Lu and M.K. Sundareshan, "Enhanced protocols for hierarchical encryption key management for secure communication in internet environments," IEEE Trans. Comm., vol. 40, no. 4, pp. 658- 660, Apr. 1992.
-
IEEE Trans. Comm.
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
17
-
-
0027719711
-
"NetCash: A design for practical electronic currency on the internet,"
-
1993 ACM Conf. Computer and Comm. Security, pp. 102-106.
-
G. Medvinsky and B.C. Neuman, "NetCash: A design for practical electronic currency on the internet," Proc. 1993 ACM Conf. Computer and Comm. Security, pp. 102-106.
-
Proc.
-
-
Medvinsky, G.1
Neuman, B.C.2
-
18
-
-
0003700417
-
"Kerberos authentication and authorization system,"
-
2.1, MIT, July 1987.
-
[18J S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer, "Kerberos authentication and authorization system," Project Athena Technical Plan, Section E.2.1, MIT, July 1987.
-
Project Athena Technical Plan, Section E.
-
-
Miller, J.S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
19
-
-
0024014116
-
"Protocol failures in cryptoSystems,"
-
vol. 76, no. 5, pp. 594-602, May 1988.
-
J.H. Moore, "Protocol failures in cryptoSystems," Proc. IEEE, vol. 76, no. 5, pp. 594-602, May 1988.
-
Proc. IEEE
-
-
Moore, J.H.1
-
21
-
-
84976850420
-
"Cryptography and secure channels,"
-
2nd edition, S. Mullender, éd., pp. 231-241. ACM Press, 1993.
-
R.M. Needham, "Cryptography and secure channels," Distributed Systems, 2nd edition, S. Mullender, éd., pp. 231-241. ACM Press, 1993.
-
Distributed Systems
-
-
Needham, R.M.1
-
22
-
-
0018048246
-
"Using encryption for authentication in large networks of computers,"
-
vol. 21, no. 12, pp. 993-999, Dec, 1978.
-
R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computers," CACM, vol. 21, no. 12, pp. 993-999, Dec, 1978.
-
CACM
-
-
Needham, R.M.1
Schroeder, M.D.2
-
23
-
-
0002656687
-
"Authentication revisited,"
-
vol. 21, no. 1, p. 7, Jan. 1987.
-
R.M. Needham and M.D. Schroeder, "Authentication revisited," Operating Systems Review, vol. 21, no. 1, p. 7, Jan. 1987.
-
Operating Systems Review
-
-
Needham, R.M.1
Schroeder, M.D.2
-
24
-
-
0002088427
-
"A note on the use of timestamps as nonces/'
-
vol. 27, no. 2, pp. 10-14 Apr. 1993.
-
B.C. Neuman and S.G. Stubblebine, "A note on the use of timestamps as nonces/' Operating Systems Review, vol. 27, no. 2, pp. 10-14 Apr. 1993.
-
Operating Systems Review
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
25
-
-
0023247970
-
"Efficient and timely mutual authentication,"
-
vol. 21, no. 1, pp. 8-10, Jan. 1987.
-
D. Otway and O. Rees, "Efficient and timely mutual authentication," Operating Systems Review, vol. 21, no. 1, pp. 8-10, Jan. 1987.
-
Operating Systems Review
-
-
Otway, D.1
Rees, O.2
-
26
-
-
33747364085
-
-
93-1367, Dept. of Computer Science, Cornell Univ., July 1993.
-
M.K. Reiter, "A security architecture for fault-tolerant systems," PhD Thesis, Cornell Univ., available as Technical Report 93-1367, Dept. of Computer Science, Cornell Univ., July 1993.
-
"A security architecture for fault-tolerant systems," PhD Thesis, Cornell Univ., available as Technical Report
-
-
Reiter, M.K.1
-
27
-
-
78650922644
-
"The MD4 message digest algorithm,"
-
90, pp. 303-311, Springer-Verlag, 1991.
-
R. Rivest, "The MD4 message digest algorithm," Proc. Advances in Cryptology: Crypto '90, pp. 303-311, Springer-Verlag, 1991.
-
Proc. Advances in Cryptology: Crypto '
-
-
Rivest, R.1
-
28
-
-
0017930809
-
"A method for obtaining digital signatures and public-key cryptosystems,"
-
vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
Comm. ACM
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
29
-
-
0026850090
-
"Roles in cryptographic protocols,"
-
1992 IEEE Symp. Security and Privacy, pp. 105-119.
-
E. Snekkenes, "Roles in cryptographic protocols," Proc. 1992 IEEE Symp. Security and Privacy, pp. 105-119.
-
Proc.
-
-
Snekkenes, E.1
-
30
-
-
33747365678
-
"On key distribution protocols for repeated authentication,"
-
vol. 27, no. 4, pp. 24-30, Oct. 1993.
-
P. Syverson, "On key distribution protocols for repeated authentication," Operating Systems Review, vol. 27, no. 4, pp. 24-30, Oct. 1993.
-
Operating Systems Review
-
-
Syverson, P.1
-
31
-
-
0026156775
-
"An analysis of the proxy problem in distributed systems,"
-
1991 IEEE Symp. Security and Privacy, pp. 255-275.
-
V. Varadharajan, P. Alien, and S. Black, "An analysis of the proxy problem in distributed systems," Proc. 1991 IEEE Symp. Security and Privacy, pp. 255-275.
-
Proc.
-
-
Varadharajan, V.1
Alien, P.2
Black, S.3
-
32
-
-
0020762394
-
"Security mechanisms in high-level network protocols,"
-
vol. 15, no. 2, pp. 135- 171,1983.
-
V.L. Voydock and ST. Kent, "Security mechanisms in high-level network protocols," Computing Surveys, vol. 15, no. 2, pp. 135- 171,1983.
-
Computing Surveys
-
-
Voydock, V.L.1
Kent, S.T.2
-
33
-
-
0028380781
-
"Authentication in the Taos operating system,"
-
vol. 12, no. 1, pp. 3-32, Feb. 1994.
-
E. Wobber, M. Abadi, M. Burrows, and D. Lampson, "Authentication in the Taos operating system," ACM Trans. Computer Systems, vol. 12, no. 1, pp. 3-32, Feb. 1994.
-
ACM Trans. Computer Systems
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, D.4
-
34
-
-
0026630927
-
"Authentication for distributed systems,"
-
vol. 25, no. 1, pp. 39-52, Jan. 1992.
-
T.Y.C. Woo and S.S. Lam, "Authentication for distributed systems," Computer, vol. 25, no. 1, pp. 39-52, Jan. 1992.
-
Computer
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
35
-
-
33747332115
-
-
vol. 28, no. 3, pp.24-37, July 1994.
-
T.Y.C. Woo and S.S. Lam,. "A lesson on authentication protocol design," Operating Systems Review, vol. 28, no. 3, pp.24-37, July 1994.
-
Operating Systems Review
-
-
Woo, T.Y.C.1
Lam, S.S.2
Design, O.A.P.3
-
36
-
-
0027266208
-
"Trust relations in secure systems-A distributed authentication perspective,"
-
1993 IEEE Symp. Security and Privacy, pp. 150-164.
-
R. Yahalom, B. Klein, and T. Beth, "Trust relations in secure systems-A distributed authentication perspective," Proc. 1993 IEEE Symp. Security and Privacy, pp. 150-164.
-
Proc.
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
|