-
1
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aziz, A. and Diffie, W., Privacy and Authentication for Wireless Local Area Networks, IEEE Personal Commun. 1(1):25-31 (1994).
-
(1994)
IEEE Personal Commun.
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
2
-
-
0025388480
-
A security scheme for resource shoring over a network
-
Burns, J. and Mitchell, C. J., A Security Scheme for Resource Shoring Over a Network, Computers and Security 9:67-76 (1990).
-
(1990)
Computers and Security
, vol.9
, pp. 67-76
-
-
Burns, J.1
Mitchell, C.J.2
-
3
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R., A Logic of Authentication, ACM Trans. Computer Syst. 8(1):18-36 (1990).
-
(1990)
ACM Trans. Computer Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning, D. E. and Sacco, G. M., Timestamps in Key Distribution Protocols, Commun. ACM 24(8):533-536 (1981).
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., van Oorschot, P. C., and Wiener, M. J., Authentication and Authenticated Key Exchanges, Designs, Codes, and Cryptography 2:107-125 (1992).
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
0020190170
-
On the security of ping-pong protocols
-
Dolev, D., Even, S., and Karp, R., On the Security of Ping-Pong Protocols, Inform. Control 55:57-68 (1982).
-
(1982)
Inform. Control
, vol.55
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.3
-
8
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D. and Yao, A., On the Security of Public Key Protocols, IEEE Trans. Inform. Theory 29(2):198-208 (1983).
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
9
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R., Meadows, C., and Millen, J., Three Systems for Cryptographic Protocol Analysis, J. Cryptology 7(2):79-130 (1994).
-
(1994)
J. Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
10
-
-
0026152198
-
A system for the specification and analysis of key management protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Meadows, C., A System for the Specification and Analysis of Key Management Protocols, Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California, 1991, pp. 182-195.
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 182-195
-
-
Meadows, C.1
-
11
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
Meadows, C., Applying Formal Methods to the Analysis of a Key Management Protocol, J. Computer Security 1:5-53 (1992).
-
(1992)
J. Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
12
-
-
0001566477
-
Formal verification of cryptographic protocols: A survey
-
to Springer-Verlag, Berlin
-
Meadows, C., Formal Verification of Cryptographic Protocols: A Survey, in: Proceedings of AsiaCrypt '94, to Springer-Verlag, Berlin, pp. 133-150.
-
Proceedings of AsiaCrypt '94
, pp. 133-150
-
-
Meadows, C.1
-
13
-
-
0002088427
-
A note on the use of timestamps as nonces
-
Neuman, B. C. and Stubblebine, S. G., A Note on the Use of Timestamps as Nonces, Operating Syst. Rev. 27(2):10-14 (1993).
-
(1993)
Operating Syst. Rev.
, vol.27
, Issue.2
, pp. 10-14
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
14
-
-
84937437271
-
How to (selectively) broadcast a secret
-
IEEE Computer Society Press, New York
-
Simmons, G. J., How to (Selectively) Broadcast a Secret, in: Proceedings of the 1985 IEEE Computer Society Symposium on Security and Privacy, IEEE Computer Society Press, New York, 1985, pp. 108-113.
-
(1985)
Proceedings of the 1985 IEEE Computer Society Symposium on Security and Privacy
, pp. 108-113
-
-
Simmons, G.J.1
-
15
-
-
0027227136
-
A logical language for specifying cryptographic protocol requirements
-
IEEE Computer Society Press, Los Alamitos, CA
-
Syverson, P. and Meadows, C., A Logical Language for Specifying Cryptographic Protocol Requirements, in: Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA 1993, pp. 165-177.
-
(1993)
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 165-177
-
-
Syverson, P.1
Meadows, C.2
-
16
-
-
1442341305
-
Formal requirements for key distribution protocols
-
Springer, Berlin, to appear
-
Syverson, P. and Meadows, C., Formal Requirements for Key Distribution Protocols, in: Proceedings of Eurocrypt 94, Lecture Notes in Computer Science Springer, Berlin, 1994, to appear.
-
(1994)
Proceedings of Eurocrypt 94, Lecture Notes in Computer Science
-
-
Syverson, P.1
Meadows, C.2
-
17
-
-
0039726366
-
-
to appear
-
Syverson, P. and Meadows, C., A Formal Language for Cryptographic Protocol Requirements, Designs, Codes, and Cryptography, to appear.
-
A Formal Language for Cryptographic Protocol Requirements, Designs, Codes, and Cryptography
-
-
Syverson, P.1
Meadows, C.2
|