-
1
-
-
84945119254
-
Entity authentication and key distribution
-
Springer, Berlin
-
M. Bellare, P. Rogaway, Entity authentication and key distribution, Advances in Cryptology - CRYPTO '93, Springer, Berlin, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology - CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Springer, Berlin
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of two-party authentication protocols, Advances in Cryptology - CRYPTO'91, Springer, Berlin, 1991, pp. 44-61.
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
84976665942
-
Timestamps in key distribution systems
-
D.E. Denning, G.M. Sacco, Timestamps in key distribution systems, Communications of the ACM 24 (8) (1981) 533-536.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
4
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. van Oorschot, M.J. Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography 2 (2) (1992) 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
5
-
-
0029208641
-
Several practical protocols for authentication and key exchange
-
C.H. Lim, P.J. Lee, Several practical protocols for authentication and key exchange, Information Processing Letters 53 (1995) 91-96.
-
(1995)
Information Processing Letters
, vol.53
, pp. 91-96
-
-
Lim, C.H.1
Lee, P.J.2
-
7
-
-
0029368205
-
Secure and minimal protocols for authenticated key distribution
-
P. Janson, G. Tsudik, Secure and minimal protocols for authenticated key distribution, Computer Communications 18 (9) (1995) 645-653.
-
(1995)
Computer Communications
, vol.18
, Issue.9
, pp. 645-653
-
-
Janson, P.1
Tsudik, G.2
-
9
-
-
0002783180
-
Using one-way functions for authentication
-
L. Gong, Using one-way functions for authentication, ACM Computer Communication Review 19 (5) (1989) 8-11.
-
(1989)
ACM Computer Communication Review
, vol.19
, Issue.5
, pp. 8-11
-
-
Gong, L.1
-
10
-
-
0018048246
-
Using encryption for audientication in large networks of computers
-
R.M. Needham, M.D. Schroeder, Using encryption for audientication in large networks of computers, Communications of the ACM 21 (12) (1978) 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
13
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B.C. Neuman, J. Ts'o, Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32 (9) (1994) 33-38.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, J.2
-
14
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway, O. Rees, Efficient and timely mutual authentication. Operating Systems Review 21 (1) (1987) 8-10.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
16
-
-
2742584770
-
An authentication and key distribution system for open network system
-
S.P. Shieh, W.H. Yang, An authentication and key distribution system for open network system, ACM Operating Systems Review 30 (2) (1996) 32-41.
-
(1996)
ACM Operating Systems Review
, vol.30
, Issue.2
, pp. 32-41
-
-
Shieh, S.P.1
Yang, W.H.2
-
17
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
P. Syverson, On key distribution protocols for repeated authentication, ACM Operating Systems Review 27 (4) (1993) 24-30.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.1
-
19
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
Country Kerry, Ireland
-
L. Gong, Optimal authentication protocols resistant to password guessing attacks, Proceedings of the Eighth IEEE Computer Security Foundations Workshop, Country Kerry, Ireland, pp. 24-29, 1995.
-
(1995)
Proceedings of the Eighth IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
20
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Springer, Berlin
-
Y. Desmedt, Society and group oriented cryptography: A new concept, in Advances in Cryptology - CRYPTO'87, Springer, Berlin, pp. 120-127, 1988.
-
(1988)
Advances in Cryptology - CRYPTO'87
, pp. 120-127
-
-
Desmedt, Y.1
-
26
-
-
0029346019
-
Methodical use of cryptographic transformations in authentication protocols
-
W. Mao, C. Boyd, Methodical use of cryptographic transformations in authentication protocols, IEE Proceedings Computers and Digital Techniques 142 (4) (1995) 272-278.
-
(1995)
IEE Proceedings Computers and Digital Techniques
, vol.142
, Issue.4
, pp. 272-278
-
-
Mao, W.1
Boyd, C.2
-
27
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990) 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|