-
1
-
-
84964476742
-
i KP - A family of secure electronic payment protocols
-
Bellare M., Garay J.A., Hauser R., Herzberg A., Krawczyk H., Steiner M., Tsudik G., Waidner M. i KP - a family of secure electronic payment protocols. 1st USENIX Workshop on Electronic Commerce. 1995;89-106.
-
(1995)
1st USENIX Workshop on Electronic Commerce
, pp. 89-106
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
2
-
-
35248872489
-
-
Bellare M., Garay J.A., Hauser R., Herzberg A., Krawczyk H., Steiner M., Tsudik G., Waidner M. i KP - a family of secure electronic payment protocols (Working draft), 1995. http://citeseer.nj.nec.com/bellare95ikp.html.
-
(1995)
i KP - A Family of Secure Electronic Payment Protocols (Working Draft)
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
3
-
-
0033731024
-
Design, implementation and deployment of the i KP secure electronic payment system
-
Bellare M., Garay J.A., Hauser R., Herzberg A., Krawczyk H., Steiner M., Tsudik G., Van Herreweghen E., Waidner M. Design, implementation and deployment of the i KP secure electronic payment system. IEEE J. Selected Areas Comm. 18:(4):2000;611-627.
-
(2000)
IEEE J. Selected Areas Comm.
, vol.18
, Issue.4
, pp. 611-627
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Van Herreweghen, E.8
Waidner, M.9
-
5
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Inform. Process. Lett. 56:1995;131-133.
-
(1995)
Inform. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
7
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Comm. ACM. 21:(12):1978;993-999.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
8
-
-
0012245984
-
Formal analysis of the i KP electronic payment protocols
-
IS-RR-2002-020
-
K. Ogata, K. Futatsugi, Formal analysis of the i KP electronic payment protocols. JAIST Research Report, IS-RR-2002-020, 2002.
-
(2002)
JAIST Research Report
-
-
Ogata, K.1
Futatsugi, K.2
-
9
-
-
0012305831
-
Rewriting-based verification of authentication protocols
-
Amsterdam: Elsevier Science Publishers
-
Ogata K., Futatsugi K. Rewriting-based verification of authentication protocols. WRLA'02, ENTCS, Vol. 71. 2002;Elsevier Science Publishers, Amsterdam.
-
(2002)
WRLA'02, ENTCS
, vol.71
-
-
Ogata, K.1
Futatsugi, K.2
-
10
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security. 6:1998;85-128.
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
|