-
1
-
-
85031620050
-
A semantics for a logic of authentication
-
[AT91] August
-
[AT91] Martin Abadi and Mark R. Tuttle, "A Semantics for a Logic of Authentication", Tenth Annual ACM Symp on Princ of Dist Computing, Montreal, Canada, August, 1991
-
(1991)
Tenth Annual ACM Symp On Princ of Dist Computing, Montreal, Canada
-
-
Abadi, M.1
Tuttle, M.R.2
-
2
-
-
0004019982
-
A practical study in belief and action
-
[BAN88] Asilomar, Ca. Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif.
-
[BAN88] Burrows, M., Abadi, M., Needham, R.M. "A Practical Study in Belief and Action", In Proceedings of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342
-
(1988)
Proceedings of the 2nd Conf On Theoretical Aspects of Reasoning about Knowledge
, pp. 325-342
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
3
-
-
0025386404
-
A logic of authentication
-
[BAN90] Feb
-
[BAN90] Burrows, M., Abadi, M., Needham, R. M. "A Logic of Authentication", ACM Transactions on Computer Systems, Vol. 8, No. 1, Feb 1990, pp. 18-36.
-
(1990)
ACM Transactions On Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
4
-
-
0011936788
-
Rejoinder to nessett
-
[BAN90b] April
-
[BAN90b] Burrows, M., Abadi, M., Needham, R.M., "Rejoinder to Nessett", ACM Operating Systems Review, vol 24, no.2, April 1990, pp 39-40
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 39-40
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
5
-
-
0027617333
-
Systematic design of a family of attack resistant authentication protocols
-
[BIRD93] June
-
[BIRD93] Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung. "Systematic Design of a Family of Attack Resistant Authentication Protocols", IEEE Journal on Selected Areas in Communications, Vol 11, No. 5, June 1993
-
(1993)
IEEE Journal On Selected Areas in Communications
, vol.11
, Issue.5
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
7
-
-
0004253669
-
-
[DIJK76] Prentice Hall Series in Automatic Computation Prentice-Hall Inc. Englewood Cliffs, NJ
-
[DIJK76] Edsger W. Dijkstra, "A Discipline of Programming", Prentice Hall Series in Automatic Computation, Prentice-Hall Inc. Englewood Cliffs, NJ, 1976
-
(1976)
A Discipline of Programming
-
-
Edsger, W.1
Dijkstra2
-
8
-
-
0020720357
-
On the security of public key protocols
-
[DOL83] Mar.
-
[DOL83] Dolev, D, Yao, A.C. "On the security of public key protocols". IEEE Trans. Inf. Theory IT-29, 2(Mar. 1983), pp. 198-208
-
(1983)
IEEE Trans. Inf. Theory
, vol.2 IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
10
-
-
0025023289
-
Reasoning about Belief in Cryptographic protocols
-
[GNY90]
-
[GNY90] Gong, L., Needham, R., Yahalom, R. "Reasoning about Belief in Cryptographic protocols". From 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234-248
-
From 1990 IEEE Computer Society Symposium On Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
11
-
-
84945708698
-
An axiomatic basis for computer programming
-
[HOAR69] Oct
-
[HOAR69] C.A.R. Hoare, "An Axiomatic Basis for Computer Programming", Communications of the ACM, Vol 12, Number 10, Oct 1969
-
(1969)
Communications of the ACM
, vol.12
, Issue.10
-
-
Hoare, C.A.R.1
-
12
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
[KMM93]
-
[KMM93] R. Kemmerer, C. Meadows, J. Millen, "Three Systems for Cryptographic protocol Analysis", The Journal of Cryptology, Vol. 7, No. 2
-
The Journal of Cryptology
, vol.7
, Issue.2
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
14
-
-
0023295108
-
The interrogator: Protocol security analysis
-
[MIL87] Feb.
-
[MIL87] Millen, J.K., Clark, S. C., Freedman, S. B. "The interrogator: Protocol security analysis". IEEE Trans. Sofw. eng. SE-13, 2(Feb. 1987), pp. 274-288
-
(1987)
IEEE Trans. Sofw. Eng.
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
16
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
[NS78] Dec.
-
[NS78] Needham, R. M., Schroeder, M. D. "Using encryption for authentication in large networks of computers". Commun. ACM 21, 12 (Dec. 1978), pp. 993-999
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
17
-
-
0002656687
-
Authentication revisited
-
[NS87] January
-
[NS87] Needham, R.M. & Schroeder, M.D., "Authentication Revisited", ACM Operating Systems Review, Vol. 21, No. 1, January 1987.
-
(1987)
ACM Operating Systems Review
, vol.21
, Issue.1
-
-
Needham, R.M.1
Schroeder, M.D.2
-
18
-
-
0025405980
-
A critique of the burrows, abadi, needham logic
-
[NESS90] April
-
[NESS90] D. Nessett, "A Critique of the Burrows, Abadi, Needham Logic", ACM Operating Systems Review, vol. 24, no. 2, April 1990, pp. 35-38
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.1
-
19
-
-
0023247970
-
Efficient and timely mutual authentication
-
[OTWY87] Jan.
-
[OTWY87] Otwy, D., Rees, O. "Efficient and timely mutual authentication". Operating Systems Review 21, 1(Jan. 1987), pp. 8-10
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otwy, D.1
Rees, O.2
-
22
-
-
84974755213
-
Knowledge, belief, semantics in the analysis of cryptographic protocols
-
[SYV92]
-
[SYV92] Syverson, P., "Knowledge, Belief, Semantics in the Analysis of Cryptographic Protocols", Journal of Computer Security 1 (1992), pp 317-334
-
(1992)
Journal of Computer Security
, vol.1
, pp. 317-334
-
-
Syverson, P.1
-
24
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
[SYV93b] October
-
[SYV93b] Syverson, P., "On Key Distribution Protocols for Repeated Authentication" Operating Systems Review vol 27, no 4, October 1993, pp. 24-30.
-
(1993)
Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.1
-
25
-
-
0027929693
-
On unifying some cryptographic protocol logics
-
[SYVOOR94] May 16-18 Oakland, California
-
[SYVOOR94] Syverson, P., van Oorschot, P.C., "On Unifying Some Cryptographic Protocol Logics", in Proceedings of the 1994 IEEE Computer Societ Symposium on Research in Security and Privacy, May 16-18, 1994 Oakland, California
-
(1994)
Proceedings of the 1994 IEEE Computer Societ Symposium On Research in Security and Privacy
-
-
Syverson, P.1
Van Oorschot, P.C.2
|