메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 88-95

Authentication by correspondence

Author keywords

Correspondence properties; Entity authentication; Protocol verification

Indexed keywords

CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; DATA TRANSFER; FORMAL LOGIC; INFORMATION TECHNOLOGY; NETWORK PROTOCOLS;

EID: 0037252920     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806132     Document Type: Article
Times cited : (15)

References (25)
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS, D. R. Stinson, Ed.
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Advances Cryptology, vol. 773, LNCS, D. R. Stinson, Ed., 1994, pp. 232-249.
    • (1994) Proc. Advances Cryptology , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0012793341 scopus 로고
    • Basic reference model for open systems interconnection (OSI) part 2: Security architecture
    • Int. Org. Standardization, Genève, Switzerland
    • "Basic Reference model for open systems interconnection (OSI) Part 2: Security architecture," Int. Org. Standardization, Genève, Switzerland, 1989.
    • (1989)
  • 11
    • 0012841823 scopus 로고    scopus 로고
    • Proposal for the IKEv2 protocol
    • IETF, draft-ietf-ipsec-ikev2-02.txt
    • D. Harkins, C. Kaufman, S. Kent, T. Kivinen, and R. Perlman, "Proposal for the IKEv2 Protocol," IETF, draft-ietf-ipsec-ikev2-02.txt, 2002.
    • (2002)
    • Harkins, D.1    Kaufman, C.2    Kent, S.3    Kivinen, T.4    Perlman, R.5
  • 12
    • 0012876138 scopus 로고
    • Information technology-Security techniques-Entity authentication mechanisms; Part 1: General model
    • Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9798-1, 2nd ed.
    • "Information Technology-Security Techniques-Entity Authentication Mechanisms; Part 1: General Model," Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9798-1, 2nd ed., 1991.
    • (1991)
  • 13
    • 0004309408 scopus 로고    scopus 로고
    • Information technology - Open systems interconnection - The directory-Authentication framework
    • Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9594-8-ITU-T Rec X.509 (1997 E)
    • "Information Technology - Open Systems Interconnection - The Directory-Authentication Framework," Int. Org. Standardization, Genève, Switzerland, Tech. Rep. ISO/IEC 9594-8-ITU-T Rec X.509 (1997 E), 1997.
    • (1997)
  • 14
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe, "An attack on the Needham-Schroeder public-key authentication protocol," Inform. Processing Lett., vol. 56, pp. 131-133, 1995.
    • (1995) Inform. Processing Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 15
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • LNCS, B. Steffen and T. Margaria, Eds.
    • ____, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in Proc. TACAS, vol. 1055, LNCS, B. Steffen and T. Margaria, Eds., 1996, pp. 147-166.
    • (1996) Proc. TACAS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 22
    • 0000937825 scopus 로고    scopus 로고
    • Verifying authentication protocols in CSP
    • Sept.
    • ____, "Verifying authentication protocols in CSP," IEEE Trans. Softw. Eng., vol. 24, pp. 741-758, Sept. 1998.
    • (1998) IEEE Trans. Softw. Eng. , vol.24 , pp. 741-758
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.