메뉴 건너뛰기




Volumn 22, Issue 1, 1996, Pages 6-15

Prudent engineering practice for cryptographie protocols

Author keywords

Cryptography, authentication, cryptographic protocols, authentication protocols, security

Indexed keywords


EID: 0002885224     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.481513     Document Type: Article
Times cited : (332)

References (36)
  • 2
    • 0000874415 scopus 로고    scopus 로고
    • "Limitations of the Kerberos authentication system,"
    • vol. 20, no. 5, pp. 119-132, Oct. 1990.
    • S.M. Bellovin and M. Merritt, "Limitations of the Kerberos authentication system," Computer Comm. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
    • Computer Comm. Review
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 0004215976 scopus 로고    scopus 로고
    • "A logic of authentication,"
    • vol. 426, pp. 233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report no. 39, Feb. 1989.
    • M. Burrows, M. Abadi, and R.M. Needham, "A logic of authentication," Proc. Royal Soc. London A, vol. 426, pp. 233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report no. 39, Feb. 1989.
    • Proc. Royal Soc. London a
    • Burrows, M.1    Abadi, M.2    Needham, R.M.3
  • 5
    • 33747378904 scopus 로고    scopus 로고
    • 1TT Blue Book, Recommendation X.509 and ISO 9594- 8: The Directory-Authentication Framework. Geneva, Mar. 1988.
    • CCITT. CC1TT Blue Book, Recommendation X.509 and ISO 9594- 8: The Directory-Authentication Framework. Geneva, Mar. 1988.
    • Ccitt, C.C.1
  • 6
    • 84976665942 scopus 로고    scopus 로고
    • "Timestamps in key distribution protocols,"
    • vol. 24, no. 8, pp. 533-536, Aug. 1981.
    • D.E. Denning and G.M. Sacco, "Timestamps in key distribution protocols," CACM, vol. 24, no. 8, pp. 533-536, Aug. 1981.
    • CACM
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0023569922 scopus 로고    scopus 로고
    • "Zero knowledge proofs of identity,"
    • 19th Ann. ACM Symp. Theory of Computing, pp. 210-217,1987.
    • [7J U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," Proc. 19th Ann. ACM Symp. Theory of Computing, pp. 210-217,1987.
    • Proc.
    • Feige, J.U.1    Fiat, A.2    Shamir, A.3
  • 8
    • 0003370741 scopus 로고    scopus 로고
    • "A security risk of depending on synchronized clocks,"
    • vol. 26, no. 1, pp. 49-54, Jan. 1992.
    • L. Gong, "A security risk of depending on synchronized clocks," Operating Systems Review, vol. 26, no. 1, pp. 49-54, Jan. 1992.
    • Operating Systems Review
    • Gong, L.1
  • 12
    • 84976834054 scopus 로고    scopus 로고
    • "Authentication in distributed systems: Theory and practice,"
    • vol. 10, no. 4, pp. 265-310, Nov. 1992.
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Computer Systems, vol. 10, no. 4, pp. 265-310, Nov. 1992.
    • ACM Trans. Computer Systems
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 13
    • 0042664779 scopus 로고    scopus 로고
    • "Authentication in distributed systems: A bibliography,"
    • vol. 27, no. 4, pp. 31-41, Oct. 1993.
    • A. Liebl. "Authentication in distributed systems: A bibliography," Operating Systems Review, vol. 27, no. 4, pp. 31-41, Oct. 1993.
    • Operating Systems Review
    • Liebl, A.1
  • 14
    • 0024749621 scopus 로고    scopus 로고
    • "Secure communication in internet environments: A hierarchical key management scheme for end-to-end encryption,"
    • vol. 37, no. 10, pp. 1,014-1,023, Oct. 1989.
    • W.P. Lu and M.K. Sundareshan, "Secure communication in internet environments: A hierarchical key management scheme for end-to-end encryption," IEEE Trans. Comm., vol. 37, no. 10, pp. 1,014-1,023, Oct. 1989.
    • IEEE Trans. Comm.
    • Lu, W.P.1    Sundareshan, M.K.2
  • 15
    • 0026853767 scopus 로고    scopus 로고
    • "Enhanced protocols for hierarchical encryption key management for secure communication in internet environments,"
    • vol. 40, no. 4, pp. 658- 660, Apr. 1992.
    • W.P. Lu and M.K. Sundareshan, "Enhanced protocols for hierarchical encryption key management for secure communication in internet environments," IEEE Trans. Comm., vol. 40, no. 4, pp. 658- 660, Apr. 1992.
    • IEEE Trans. Comm.
    • Lu, W.P.1    Sundareshan, M.K.2
  • 17
    • 0027719711 scopus 로고    scopus 로고
    • "NetCash: A design for practical electronic currency on the internet,"
    • 1993 ACM Conf. Computer and Comm. Security, pp. 102-106.
    • G. Medvinsky and B.C. Neuman, "NetCash: A design for practical electronic currency on the internet," Proc. 1993 ACM Conf. Computer and Comm. Security, pp. 102-106.
    • Proc.
    • Medvinsky, G.1    Neuman, B.C.2
  • 19
    • 0024014116 scopus 로고    scopus 로고
    • "Protocol failures in cryptoSystems,"
    • vol. 76, no. 5, pp. 594-602, May 1988.
    • J.H. Moore, "Protocol failures in cryptoSystems," Proc. IEEE, vol. 76, no. 5, pp. 594-602, May 1988.
    • Proc. IEEE
    • Moore, J.H.1
  • 21
    • 84976850420 scopus 로고    scopus 로고
    • "Cryptography and secure channels,"
    • 2nd edition, S. Mullender, éd., pp. 231-241. ACM Press, 1993.
    • R.M. Needham, "Cryptography and secure channels," Distributed Systems, 2nd edition, S. Mullender, éd., pp. 231-241. ACM Press, 1993.
    • Distributed Systems
    • Needham, R.M.1
  • 22
    • 0018048246 scopus 로고    scopus 로고
    • "Using encryption for authentication in large networks of computers,"
    • vol. 21, no. 12, pp. 993-999, Dec, 1978.
    • R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computers," CACM, vol. 21, no. 12, pp. 993-999, Dec, 1978.
    • CACM
    • Needham, R.M.1    Schroeder, M.D.2
  • 24
    • 0002088427 scopus 로고    scopus 로고
    • "A note on the use of timestamps as nonces/'
    • vol. 27, no. 2, pp. 10-14 Apr. 1993.
    • B.C. Neuman and S.G. Stubblebine, "A note on the use of timestamps as nonces/' Operating Systems Review, vol. 27, no. 2, pp. 10-14 Apr. 1993.
    • Operating Systems Review
    • Neuman, B.C.1    Stubblebine, S.G.2
  • 25
    • 0023247970 scopus 로고    scopus 로고
    • "Efficient and timely mutual authentication,"
    • vol. 21, no. 1, pp. 8-10, Jan. 1987.
    • D. Otway and O. Rees, "Efficient and timely mutual authentication," Operating Systems Review, vol. 21, no. 1, pp. 8-10, Jan. 1987.
    • Operating Systems Review
    • Otway, D.1    Rees, O.2
  • 27
    • 78650922644 scopus 로고    scopus 로고
    • "The MD4 message digest algorithm,"
    • 90, pp. 303-311, Springer-Verlag, 1991.
    • R. Rivest, "The MD4 message digest algorithm," Proc. Advances in Cryptology: Crypto '90, pp. 303-311, Springer-Verlag, 1991.
    • Proc. Advances in Cryptology: Crypto '
    • Rivest, R.1
  • 28
    • 0017930809 scopus 로고    scopus 로고
    • "A method for obtaining digital signatures and public-key cryptosystems,"
    • vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • Comm. ACM
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 29
    • 0026850090 scopus 로고    scopus 로고
    • "Roles in cryptographic protocols,"
    • 1992 IEEE Symp. Security and Privacy, pp. 105-119.
    • E. Snekkenes, "Roles in cryptographic protocols," Proc. 1992 IEEE Symp. Security and Privacy, pp. 105-119.
    • Proc.
    • Snekkenes, E.1
  • 30
    • 33747365678 scopus 로고    scopus 로고
    • "On key distribution protocols for repeated authentication,"
    • vol. 27, no. 4, pp. 24-30, Oct. 1993.
    • P. Syverson, "On key distribution protocols for repeated authentication," Operating Systems Review, vol. 27, no. 4, pp. 24-30, Oct. 1993.
    • Operating Systems Review
    • Syverson, P.1
  • 31
    • 0026156775 scopus 로고    scopus 로고
    • "An analysis of the proxy problem in distributed systems,"
    • 1991 IEEE Symp. Security and Privacy, pp. 255-275.
    • V. Varadharajan, P. Alien, and S. Black, "An analysis of the proxy problem in distributed systems," Proc. 1991 IEEE Symp. Security and Privacy, pp. 255-275.
    • Proc.
    • Varadharajan, V.1    Alien, P.2    Black, S.3
  • 32
    • 0020762394 scopus 로고    scopus 로고
    • "Security mechanisms in high-level network protocols,"
    • vol. 15, no. 2, pp. 135- 171,1983.
    • V.L. Voydock and ST. Kent, "Security mechanisms in high-level network protocols," Computing Surveys, vol. 15, no. 2, pp. 135- 171,1983.
    • Computing Surveys
    • Voydock, V.L.1    Kent, S.T.2
  • 34
    • 0026630927 scopus 로고    scopus 로고
    • "Authentication for distributed systems,"
    • vol. 25, no. 1, pp. 39-52, Jan. 1992.
    • T.Y.C. Woo and S.S. Lam, "Authentication for distributed systems," Computer, vol. 25, no. 1, pp. 39-52, Jan. 1992.
    • Computer
    • Woo, T.Y.C.1    Lam, S.S.2
  • 36
    • 0027266208 scopus 로고    scopus 로고
    • "Trust relations in secure systems-A distributed authentication perspective,"
    • 1993 IEEE Symp. Security and Privacy, pp. 150-164.
    • R. Yahalom, B. Klein, and T. Beth, "Trust relations in secure systems-A distributed authentication perspective," Proc. 1993 IEEE Symp. Security and Privacy, pp. 150-164.
    • Proc.
    • Yahalom, R.1    Klein, B.2    Beth, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.