-
1
-
-
84976731140
-
A key distribution protocol using event markers
-
(Aug
-
BAUER, R. K., BERSON, T. A., AND FEIERTAG, R. J. A key distribution protocol using event markers. ACM Trans. Comput. Syst. 1, 3 (Aug. 1983), 249-255.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 249-255
-
-
BAUER, R.K.1
BERSON, T.A.2
FEIERTAG, R.J.3
-
2
-
-
0004019982
-
-
Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. M. Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342.
-
(1988)
, pp. 325-342
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.M.3
-
3
-
-
84976840063
-
-
A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. M. A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989.
-
(1989)
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.M.3
-
4
-
-
84976654874
-
-
CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov
-
CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov. 1987.
-
(1987)
-
-
-
5
-
-
84976671974
-
Cryptographic protocols
-
(San Francisco, May 1982), ACM, New York
-
DEMILLO, R. A., LYNCH, N. A., AND MERRITT, M. J. Cryptographic protocols. In Proceedings of the 14th ACM Symposium on the Theory of Computing (San Francisco, May 1982), ACM, New York, 1982, pp. 383-400.
-
(1982)
Proceedings of the 14th ACM Symposium on the Theory of Computing
, pp. 383-400
-
-
DEMILLO, R.A.1
LYNCH, N.A.2
MERRITT, M.J.3
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
(Aug
-
DENNING, D. E., AND SACCO, G. M. Timestamps in key distribution protocols. Commun. ACM 24, 8 (Aug. 1981), 533-536.
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
DENNING, D.E.1
SACCO, G.M.2
-
7
-
-
0020720357
-
On the security of public key protocols
-
(Mar
-
DOLEV, D., AND YAO, A. C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29, 2 (Mar. 1983), 198-208.
-
(1983)
IEEE Trans. Inf. Theory IT-29
, vol.2
, pp. 198-208
-
-
DOLEV, D.1
YAO, A.C.2
-
8
-
-
84871625580
-
Knowledge and common knowledge in a distributed environment
-
(Vancouver, British Columbia, Aug. 1984), ACM, New York
-
HALPERN, J. Y., AND MOSES, Y. O. Knowledge and common knowledge in a distributed environment. In Proceedings of the 3rd ACM Conference on the Principles of Distributed Computing (Vancouver, British Columbia, Aug. 1984), ACM, New York, 1984, pp. 480-490.
-
(1984)
Proceedings of the 3rd ACM Conference on the Principles of Distributed Computing
, pp. 480-490
-
-
HALPERN, J.Y.1
MOSES, Y.O.2
-
9
-
-
0010281005
-
A knowledge-based analysis of zero knowledge (preliminary report)
-
(Chicago, Ill., May 1988), ACM, New York
-
HALPERN, J. Y., MOSES, Y. O., AND TUTTLE, M. R. A knowledge-based analysis of zero knowledge (preliminary report). In Proceedings of the 20th ACM Symposium on Theory of Computing (Chicago, Ill., May 1988), ACM, New York, 1988, pp. 132-147.
-
(1988)
Proceedings of the 20th ACM Symposium on Theory of Computing
, pp. 132-147
-
-
HALPERN, J.Y.1
MOSES, Y.O.2
TUTTLE, M.R.3
-
10
-
-
84945708698
-
An axiomatic basis for computer programming
-
(Oct
-
HOARE, C. A. R. An axiomatic basis for computer programming. Commun. ACM 12, 10 (Oct. 1969), 576-580.
-
(1969)
Commun. ACM
, vol.12
, Issue.10
, pp. 576-580
-
-
HOARE, C.A.R.1
-
11
-
-
84976821646
-
-
States of knowledge in cryptographic protocols. Draft
-
MERRITT, M. J., AND WOLPER, P. L. States of knowledge in cryptographic protocols. Draft.
-
-
-
MERRITT, M.J.1
WOLPER, P.L.2
-
12
-
-
0023295108
-
The interrogator: Protocol security analysis
-
(Feb
-
MILLEN, J. K., CLARK, S. C., AND FREEDMAN, S. B. The interrogator: Protocol security analysis. IEEE Trans. Softw. Eng. SE-13, 2 (Feb. 1987), 274-288.
-
(1987)
IEEE Trans. Softw. Eng. SE-13
, vol.2
, pp. 274-288
-
-
MILLEN, J.K.1
CLARK, S.C.2
FREEDMAN, S.B.3
-
13
-
-
0002917347
-
Kerberos authentication and authorization system
-
Sect. E.2.1. MIT, Cambridge, Mass., July
-
MILLER, S. P., NEUMAN, C., SCHILLER, J. I., AND SALTZER, J. H. Kerberos authentication and authorization system. In Project Athena Technical Plan, Sect. E.2.1. MIT, Cambridge, Mass., July 1987.
-
(1987)
Project Athena Technical Plan
-
-
MILLER, S.P.1
NEUMAN, C.2
SCHILLER, J.I.3
SALTZER, J.H.4
-
14
-
-
84976718584
-
-
National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan
-
National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan. 1977.
-
(1977)
-
-
-
15
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
(Dec
-
NEEDHAM, R. M., AND SCHROEDER, M. D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
NEEDHAM, R.M.1
SCHROEDER, M.D.2
-
16
-
-
0023247970
-
Efficient and timely mutual authentication
-
(Jan
-
OTWAY, D., AND REES, O. Efficient and timely mutual authentication. Oper. Syst. Rev. 21, 1 (Jan. 1987), 8-10.
-
(1987)
Oper. Syst. Rev.
, vol.21
, Issue.1
, pp. 8-10
-
-
OTWAY, D.1
REES, O.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
(Feb
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
RIVEST, R.L.1
SHAMIR, A.2
ADLEMAN, L.3
-
18
-
-
0024714097
-
Integrating security in a large distributed system
-
(Aug
-
SATYANARAYANAN, M. Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7, 3 (Aug. 1989), 247-280.
-
(1989)
ACM Trans. Comput. Syst.
, vol.7
, Issue.3
, pp. 247-280
-
-
SATYANARAYANAN, M.1
-
19
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
(June
-
VOYDOCK, V. L., AND KENT, S. T. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June 1983), 135-171.
-
(1983)
ACM Comput. Surv.
, vol.15
, Issue.2
, pp. 135-171
-
-
VOYDOCK, V.L.1
KENT, S.T.2
|