-
3
-
-
85031773397
-
Secure Audio Teleconference
-
C. Pomerance, editor, Lecture Notes in Computer Science, Springer-Verlag
-
E.F. Brickell, P.J. Lee, and Y. Yacobi. Secure Audio Teleconference. In C. Pomerance, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'87, #293, pages 418-426. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology — CRYPTO'87
, vol.293
, pp. 418-426
-
-
Brickell, E.F.1
Lee, P.J.2
Yacobi, Y.3
-
4
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13(4):850-864, 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
85029522966
-
-
CCITT. CCITT blue book, Recommendation X.509, The Directory — Authentication Framework, November
-
CCITT. CCITT blue book, Recommendation X.509, The Directory — Authentication Framework, November 1988.
-
(1988)
-
-
-
6
-
-
85029524224
-
-
Don Coppersmith. Analysis of ISO/CCTTI Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June
-
Don Coppersmith. Analysis of ISO/CCTTI Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June 1989.
-
(1989)
-
-
-
7
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
A. M. Odlyzko, editorLecture Notes in Computer Science, Springer-Verlag
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In A. M. Odlyzko, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'86, #263, pages 186-194. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology — CRYPTO'86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
8
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof-Systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
10
-
-
16644392725
-
Security Defects in CCITT Recommendation X.509 — The Directory Authentication Framework
-
C I'Anson and C. Mitchell. Security Defects in CCITT Recommendation X.509 — The Directory Authentication Framework. Computer Communication Review, 20(2):30-34, 1990.
-
(1990)
Computer Communication Review
, vol.20
, Issue.2
, pp. 30-34
-
-
I'anson, C.1
Mitchell, C.2
-
11
-
-
85029509211
-
-
ISO. 7498-2. Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture
-
ISO. 7498-2. Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture, 1989.
-
(1989)
-
-
-
12
-
-
0024665744
-
Analyzing Encryption Protocols Using Formal Verification Techniques
-
R. A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.A.1
-
13
-
-
0023295108
-
The Interrogator: Protocol Security Analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering, 13(2):274-288, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
14
-
-
0025599775
-
Representing Partial Knowledge in an Algebraic Security Model
-
IEEE Computer Society Press
-
C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23-31. IEEE Computer Society Press, 1990.
-
(1990)
Proceedings of the Computer Security Foundations Workshop III
, pp. 23-31
-
-
Meadows, C.1
-
15
-
-
0004256761
-
-
PhD thesis, Georgia Institute of Technology
-
M. J. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.J.1
-
19
-
-
0003537266
-
Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract)
-
November
-
M-J. Toussaint. Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract), in the proceedings of ASIACRYPT'91, November 1991.
-
(1991)
The Proceedings of ASIACRYPT'91
-
-
Toussaint, M.-J.1
-
20
-
-
33644933823
-
-
PhD thesis, Université de Liège (Belgium), the Publications Collection (to appear)
-
M.-J. Toussaint. Verification of Cryptographic Protocols. PhD thesis, Université de Liège (Belgium), 1991. in the Publications Collection (to appear).
-
(1991)
Verification of Cryptographic Protocols
-
-
Toussaint, M.-J.1
-
21
-
-
0003690988
-
Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)
-
J. Feigenbaum, editor, Lecture Notes in Computer Science, Springer-Verlag
-
M-J. Toussaint. Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). In J. Feigenbaum, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPT0'91, #576, pages 24-43. Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology — CRYPT0'91
, vol.576
, pp. 24-43
-
-
Toussaint, M.-J.1
-
22
-
-
82755165301
-
Reasoning about Cryptographic Protocols (Extended Abstract)
-
Joan Feigenbaum and Michael Merritt, editors, October, DIMACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM)
-
M-J. Toussaint and P. Wolper. Reasoning about Cryptographic Protocols (Extended Abstract). In Joan Feigenbaum and Michael Merritt, editors, Distributed Computing and Cryptography (October 1989), pages 245-262. DIMACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM), 1991. Volume 2.
-
(1989)
Distributed Computing and Cryptography
, vol.2
, pp. 245-262
-
-
Toussaint, M.-J.1
Wolper, P.2
|