-
2
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS, D. R. Stinson, Ed.
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Advances Cryptology, vol. 773, LNCS, D. R. Stinson, Ed., 1994, pp. 232-249.
-
(1994)
Proc. Advances Cryptology
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
June
-
R. Bird, I. Gopal, A. Herzberg, P. A. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic design of a family of attack-resistant authentication protocols," IEEE J. Select. Areas Commun., vol. 11, pp. 679-693, June 1993.
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
LNCS, J. Feigenbaum, Ed.
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic design of two-party authentication protocols," in Proc. Advances Cryptology, vol. 576, LNCS, J. Feigenbaum, Ed., 1992, pp. 44-61.
-
(1992)
Proc. Advances Cryptology
, vol.576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
5
-
-
84949230533
-
Key agreement protocols and their security analysis
-
LNCS
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. 6th IMA Int. Conf. Cryptography Coding, vol. 1355, LNCS, 1997, pp. 30-45.
-
(1997)
Proc. 6th IMA Int. Conf. Cryptography Coding
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Designs, Codes Cryptography, vol. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
0012793341
-
Basic reference model for open systems interconnection (OSI) part 2: Security architecture
-
Int. Org. Standardization, Genève, Switzerland
-
"Basic Reference model for open systems interconnection (OSI) Part 2: Security architecture," Int. Org. Standardization, Genève, Switzerland, 1989.
-
(1989)
-
-
-
11
-
-
0012841823
-
Proposal for the IKEv2 protocol
-
IETF, draft-ietf-ipsec-ikev2-02.txt
-
D. Harkins, C. Kaufman, S. Kent, T. Kivinen, and R. Perlman, "Proposal for the IKEv2 Protocol," IETF, draft-ietf-ipsec-ikev2-02.txt, 2002.
-
(2002)
-
-
Harkins, D.1
Kaufman, C.2
Kent, S.3
Kivinen, T.4
Perlman, R.5
-
12
-
-
0012876138
-
Information technology-Security techniques-Entity authentication mechanisms; Part 1: General model
-
Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9798-1, 2nd ed.
-
"Information Technology-Security Techniques-Entity Authentication Mechanisms; Part 1: General Model," Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9798-1, 2nd ed., 1991.
-
(1991)
-
-
-
13
-
-
0004309408
-
Information technology - Open systems interconnection - The directory-Authentication framework
-
Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9594-8-ITU-T Rec X.509 (1997 E)
-
"Information Technology - Open Systems Interconnection - The Directory-Authentication Framework," Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9594-8-ITU-T Rec X.509 (1997 E), 1997.
-
(1997)
-
-
-
14
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe, "An attack on the Needham-Schroeder public-key authentication protocol," Inform. Processing Lett., vol. 56, pp. 131-133, 1995.
-
(1995)
Inform. Processing Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
15
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
LNCS, B. Steffen and T. Margaria, Eds.
-
____, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in Proc. TACAS, vol. 1055, LNCS, B. Steffen and T. Margaria, Eds., 1996, pp. 147-166.
-
(1996)
Proc. TACAS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
22
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Sept.
-
____, "Verifying authentication protocols in CSP," IEEE Trans. Softw. Eng., vol. 24, pp. 741-758, Sept. 1998.
-
(1998)
IEEE Trans. Softw. Eng.
, vol.24
, pp. 741-758
-
-
Schneider, S.1
-
24
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
F. J. T. Fábrega, J. C. Herzog, and J. D. Guttman, "Strand spaces: Why is a security protocol correct?," in Proc. IEEE Symp. Security Privacy, 1998, pp. 160-171.
-
Proc. IEEE Symp. Security Privacy, 1998
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
|