-
2
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham, M. Schroeder, "Using Encryption For Authentication in Large Networks of Computers," Commun. ACM, Vol.21, No. 12, pp.993-999, 1978
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
3
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
June
-
R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, M. Yung, "Systematic Design of a Family of Attack-Resistant Authentication Protocols," IEEE J. Select. Areas Commun., Vol.11, No.5, pp.679-693, June 1993
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
5
-
-
85055795738
-
Variations on the themes of message freshness and replay or, the difficulty of devising formal methods to analyze cryptographic protocols
-
L. Gong, "Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols," 6th IEEE Comp. Security Foundations Workshop, pp.131-136, 1993
-
(1993)
6th IEEE Comp. Security Foundations Workshop
, pp. 131-136
-
-
Gong, L.1
-
6
-
-
0004192381
-
-
CRC Press,Inc.
-
A. Menezes, P. van Oorschot, S. Vanstone, "Handbook of Applied Cryptography," CRC Press,Inc., pp.417-418, 1997
-
(1997)
Handbook of Applied Cryptography
, pp. 417-418
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
8
-
-
0029543006
-
Efficient network authentication protocols: Lower bounds and optimal implementations
-
L. Gong, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations," Distributed Computing, Vol.9, No.3, pp.131-145, 1995
-
(1995)
Distributed Computing
, vol.9
, Issue.3
, pp. 131-145
-
-
Gong, L.1
-
9
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning, G. Sacco, "Timestamps in Key Distribution Protocols,' Commun. ACM, Vol.24, No.8, pp.533-536, 1981
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
10
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows, "Applying Formal Methods to the Analysis of a Key Management Protocol," Journal of Comp. Security, Vol.1, No.1, pp.5-35, 1992
-
(1992)
Journal of Comp. Security
, vol.1
, Issue.1
, pp. 5-35
-
-
Meadows, C.1
-
12
-
-
0004215976
-
A logic of authentication
-
DEC, Feb.
-
M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication," Tech. Report SRC TR 39, DEC, Feb. 1989
-
(1989)
Tech. Report SRC TR 39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
0026152198
-
A system for the specification and analysis of key management protocols
-
C. Meadows, "A System for the Specification and Analysis of Key Management Protocols," Proc. IEEE Symp. on Research in Security and Privacy, pp.182-195, 1991
-
(1991)
Proc. IEEE Symp. on Research in Security and Privacy
, pp. 182-195
-
-
Meadows, C.1
|