메뉴 건너뛰기




Volumn 69, Issue 6, 1999, Pages 297-302

Inter-protocol interleaving attacks on some authentication and key distribution protocols

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0033605501     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0020-0190(99)00023-X     Document Type: Article
Times cited : (15)

References (16)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Trans. Software Engrg. 22 (1) (1996) 6-15.
    • (1996) IEEE Trans. Software Engrg. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 4
    • 0041915634 scopus 로고
    • Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, Switzerland
    • CCITT Recommendation X.509, The Directory-Authentication Framework, Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, Switzerland, 1993.
    • (1993) CCITT Recommendation X.509, The Directory-Authentication Framework
  • 5
    • 1342295102 scopus 로고
    • Cryptographic protocol flaws
    • IEEE Computer Society Press
    • Carlsen, Cryptographic protocol flaws, in: Proc. Computer Security Foundations Workshop VII, IEEE Computer Society Press, 1994.
    • (1994) Proc. Computer Security Foundations Workshop , vol.7
    • Carlsen1
  • 6
    • 0009404435 scopus 로고
    • International Organization for Standardization, Geneva, Switzerland
    • ISO/IEC 9798, Entity Authentication Mechanisms, International Organization for Standardization, Geneva, Switzerland, 1993.
    • (1993) ISO/IEC 9798, Entity Authentication Mechanisms
  • 7
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • L. Gong, A security risk of depending on synchronized clocks, Operat. Systems Review 26 (1) (1992) 49-53.
    • (1992) Operat. Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 10
    • 0002088427 scopus 로고
    • A note on the use of time-stamp as nonces
    • B.C. Neuman, S.G. Stubblebine, A note on the use of time-stamp as nonces, Operat. Systems Review 27 (2) (1993) 10-14.
    • (1993) Operat. Systems Review , vol.27 , Issue.2 , pp. 10-14
    • Neuman, B.C.1    Stubblebine, S.G.2
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, M.D. Schroeder, Using encryption for authentication in large networks of computers, Comm. ACM 21 (12) (1978) 993-999.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 14
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway, O. Rees, Efficient and timely mutual authentication, Operat. Systems Review 21 (1) (1987) 8-10.
    • (1987) Operat. Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 15
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • P. Syverson, On key distribution protocols for repeated authentication, Operat. Systems Review 27 (4) (1993) 24-30.
    • (1993) Operat. Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.