-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Transactions on Software Engineering, Vol. 22, No. 1, 1996, pp. 6-15.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
0000874415
-
Limitations of the kerberos authentication system
-
October
-
S. M. Bellovin and M. Merritt, "Limitations of the kerberos authentication system," ACM Communications Review, Vol. 20, No. 5, October 1990, pp. 119-132.
-
(1990)
ACM Communications Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
R. Bird, et al., "Systematic design of a family of attack-resistant authentication protocols, " IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pp. 679-693.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
-
4
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, Vol. 8, No. 1, 1990, pp. 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0345630819
-
-
Technical Report, 94-47 Communication Department, CyberSafe Corporation
-
"Deploying kerberos for large organizations," Technical Report, 94-47 Communication Department, CyberSafe Corporation, 1994.
-
(1994)
Deploying Kerberos for Large Organizations
-
-
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, 1981, pp. 533-536.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
7
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
L. Gong, "A security risk of depending on synchronized clocks," ACM Operating Systems Review, Vol. 26, No. 1, 1992, pp. 49-53.
-
(1992)
ACM Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
8
-
-
84890788516
-
Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
-
IEEE Standard 802.11, "Wireless LAN medium access control (MAC) and physical layer (PHY) specifications," IEEE Draft Standard, 1996.
-
(1996)
IEEE Draft Standard
-
-
-
9
-
-
0038824488
-
An efficient and secure authentication protocol using uncertified keys
-
I. L. Kao and R. Chow, "An efficient and secure authentication protocol using uncertified keys," ACM Operating Systems Review, Vol. 29, No. 3, 1995, pp. 14-21.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 14-21
-
-
Kao, I.L.1
Chow, R.2
-
11
-
-
0002494222
-
A nonce-based protocol for multiple authentication
-
A. Kehne, et al., "A nonce-based protocol for multiple authentication," ACM Operating Systems Review, Vol. 26, No. 4, 1992, pp. 84-89.
-
(1992)
ACM Operating Systems Review
, vol.26
, Issue.4
, pp. 84-89
-
-
Kehne, A.1
-
15
-
-
0002088427
-
A note on the use of timestamps as nonces
-
B. C. Neuman and S. G. Stubblebine, "A note on the use of timestamps as nonces," ACM Operating Systems Review, Vol. 27, No. 2, 1993, pp. 10-14.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.2
, pp. 10-14
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
18
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
Paul Syverson, "On key distribution protocols for repeated authentication," ACM Operating Systems Review, Vol. 27, No. 4, 1993, pp. 10-14.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.4
, pp. 10-14
-
-
Syverson, P.1
-
19
-
-
2742584770
-
An authentication and key distribution system for open network systems
-
S. P. Shieh and W. H. Yang, "An authentication and key distribution system for open network systems," ACM Operating Systems Review, Vol. 30, No. 2, 1996, pp. 32-41.
-
(1996)
ACM Operating Systems Review
, vol.30
, Issue.2
, pp. 32-41
-
-
Shieh, S.P.1
Yang, W.H.2
|