-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Trans. Software Engrg. 22 (1) (1996) 6-15.
-
(1996)
IEEE Trans. Software Engrg.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of a family of attack-resistant authentication protocols, IEEE J. Selected Areas Comm. 11 (5) (1993) 679-693.
-
(1993)
IEEE J. Selected Areas Comm.
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, ACM Trans. Computer Systems 18 (1) (1990) 18-36.
-
(1990)
ACM Trans. Computer Systems
, vol.18
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0041915634
-
-
Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, Switzerland
-
CCITT Recommendation X.509, The Directory-Authentication Framework, Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, Switzerland, 1993.
-
(1993)
CCITT Recommendation X.509, The Directory-Authentication Framework
-
-
-
5
-
-
1342295102
-
Cryptographic protocol flaws
-
IEEE Computer Society Press
-
Carlsen, Cryptographic protocol flaws, in: Proc. Computer Security Foundations Workshop VII, IEEE Computer Society Press, 1994.
-
(1994)
Proc. Computer Security Foundations Workshop
, vol.7
-
-
Carlsen1
-
6
-
-
0009404435
-
-
International Organization for Standardization, Geneva, Switzerland
-
ISO/IEC 9798, Entity Authentication Mechanisms, International Organization for Standardization, Geneva, Switzerland, 1993.
-
(1993)
ISO/IEC 9798, Entity Authentication Mechanisms
-
-
-
7
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
L. Gong, A security risk of depending on synchronized clocks, Operat. Systems Review 26 (1) (1992) 49-53.
-
(1992)
Operat. Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
8
-
-
0029208563
-
Two attacks on Neuman-Stubblebine authentication protocols
-
T. Hwang, N.-Y. Lee, C.-M. Li, M.-Y. Ko, Y.-H. Chen, Two attacks on Neuman-Stubblebine authentication protocols, Inform. Process. Lett. 53 (1995) 103-107.
-
(1995)
Inform. Process. Lett.
, vol.53
, pp. 103-107
-
-
Hwang, T.1
Lee, N.-Y.2
Li, C.-M.3
Ko, M.-Y.4
Chen, Y.-H.5
-
9
-
-
0002494222
-
A nonce-based protocol for multiple authentications
-
A. Kehne, J. Schonwalder, H. Langendorfer, A nonce-based protocol for multiple authentications, Operat. Systems Review 26 (4) (1992) 84-89.
-
(1992)
Operat. Systems Review
, vol.26
, Issue.4
, pp. 84-89
-
-
Kehne, A.1
Schonwalder, J.2
Langendorfer, H.3
-
11
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, M.D. Schroeder, Using encryption for authentication in large networks of computers, Comm. ACM 21 (12) (1978) 993-999.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
12
-
-
0003851399
-
-
John Wiley & Sons, New York
-
B. Schneier, Applied Cryptography: Products, Algorithms, and Source Code in C, 2nd Edn, John Wiley & Sons, New York, 1996.
-
(1996)
Applied Cryptography: Products, Algorithms, and Source Code in C, 2nd Edn
-
-
Schneier, B.1
-
13
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J.G. Steiner, B.C. Neuman, J.I. Schiller, Kerberos: An authentication service for open network systems, in: USENIX Conference Proceedings, 1988, pp. 191-202.
-
(1988)
USENIX Conference Proceedings
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
14
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway, O. Rees, Efficient and timely mutual authentication, Operat. Systems Review 21 (1) (1987) 8-10.
-
(1987)
Operat. Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
15
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
P. Syverson, On key distribution protocols for repeated authentication, Operat. Systems Review 27 (4) (1993) 24-30.
-
(1993)
Operat. Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.1
|