메뉴 건너뛰기




Volumn 8, Issue 1, 1990, Pages 18-36

A logic of Authentication

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER METATHEORY - FORMAL LOGIC; COMPUTER SYSTEMS, DIGITAL - DISTRIBUTED;

EID: 0025386404     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/77648.77649     Document Type: Article
Times cited : (1751)

References (19)
  • 1
    • 84976731140 scopus 로고
    • A key distribution protocol using event markers
    • (Aug
    • BAUER, R. K., BERSON, T. A., AND FEIERTAG, R. J. A key distribution protocol using event markers. ACM Trans. Comput. Syst. 1, 3 (Aug. 1983), 249-255.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 249-255
    • BAUER, R.K.1    BERSON, T.A.2    FEIERTAG, R.J.3
  • 2
    • 0004019982 scopus 로고
    • Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif
    • BURROWS, M., ABADI, M., AND NEEDHAM, R. M. Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342.
    • (1988) , pp. 325-342
    • BURROWS, M.1    ABADI, M.2    NEEDHAM, R.M.3
  • 3
    • 84976840063 scopus 로고
    • A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb
    • BURROWS, M., ABADI, M., AND NEEDHAM, R. M. A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989.
    • (1989)
    • BURROWS, M.1    ABADI, M.2    NEEDHAM, R.M.3
  • 4
    • 84976654874 scopus 로고
    • CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov
    • CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov. 1987.
    • (1987)
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • (Aug
    • DENNING, D. E., AND SACCO, G. M. Timestamps in key distribution protocols. Commun. ACM 24, 8 (Aug. 1981), 533-536.
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • DENNING, D.E.1    SACCO, G.M.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • (Mar
    • DOLEV, D., AND YAO, A. C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29, 2 (Mar. 1983), 198-208.
    • (1983) IEEE Trans. Inf. Theory IT-29 , vol.2 , pp. 198-208
    • DOLEV, D.1    YAO, A.C.2
  • 10
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • (Oct
    • HOARE, C. A. R. An axiomatic basis for computer programming. Commun. ACM 12, 10 (Oct. 1969), 576-580.
    • (1969) Commun. ACM , vol.12 , Issue.10 , pp. 576-580
    • HOARE, C.A.R.1
  • 11
    • 84976821646 scopus 로고    scopus 로고
    • States of knowledge in cryptographic protocols. Draft
    • MERRITT, M. J., AND WOLPER, P. L. States of knowledge in cryptographic protocols. Draft.
    • MERRITT, M.J.1    WOLPER, P.L.2
  • 14
    • 84976718584 scopus 로고
    • National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan
    • National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan. 1977.
    • (1977)
  • 15
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • (Dec
    • NEEDHAM, R. M., AND SCHROEDER, M. D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • NEEDHAM, R.M.1    SCHROEDER, M.D.2
  • 16
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • (Jan
    • OTWAY, D., AND REES, O. Efficient and timely mutual authentication. Oper. Syst. Rev. 21, 1 (Jan. 1987), 8-10.
    • (1987) Oper. Syst. Rev. , vol.21 , Issue.1 , pp. 8-10
    • OTWAY, D.1    REES, O.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • (Feb
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • RIVEST, R.L.1    SHAMIR, A.2    ADLEMAN, L.3
  • 18
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • (Aug
    • SATYANARAYANAN, M. Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7, 3 (Aug. 1989), 247-280.
    • (1989) ACM Trans. Comput. Syst. , vol.7 , Issue.3 , pp. 247-280
    • SATYANARAYANAN, M.1
  • 19
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • (June
    • VOYDOCK, V. L., AND KENT, S. T. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June 1983), 135-171.
    • (1983) ACM Comput. Surv. , vol.15 , Issue.2 , pp. 135-171
    • VOYDOCK, V.L.1    KENT, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.