메뉴 건너뛰기




Volumn 33, Issue 1, 1999, Pages 47-52

Clarifying straight replays and forced delays

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0041491608     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/309829.309842     Document Type: Article
Times cited : (7)

References (13)
  • 2
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, M. Schroeder, "Using Encryption For Authentication in Large Networks of Computers," Commun. ACM, Vol.21, No. 12, pp.993-999, 1978
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 5
    • 85055795738 scopus 로고
    • Variations on the themes of message freshness and replay or, the difficulty of devising formal methods to analyze cryptographic protocols
    • L. Gong, "Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols," 6th IEEE Comp. Security Foundations Workshop, pp.131-136, 1993
    • (1993) 6th IEEE Comp. Security Foundations Workshop , pp. 131-136
    • Gong, L.1
  • 8
    • 0029543006 scopus 로고
    • Efficient network authentication protocols: Lower bounds and optimal implementations
    • L. Gong, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations," Distributed Computing, Vol.9, No.3, pp.131-145, 1995
    • (1995) Distributed Computing , vol.9 , Issue.3 , pp. 131-145
    • Gong, L.1
  • 9
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning, G. Sacco, "Timestamps in Key Distribution Protocols,' Commun. ACM, Vol.24, No.8, pp.533-536, 1981
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 10
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows, "Applying Formal Methods to the Analysis of a Key Management Protocol," Journal of Comp. Security, Vol.1, No.1, pp.5-35, 1992
    • (1992) Journal of Comp. Security , vol.1 , Issue.1 , pp. 5-35
    • Meadows, C.1
  • 13
    • 0026152198 scopus 로고
    • A system for the specification and analysis of key management protocols
    • C. Meadows, "A System for the Specification and Analysis of Key Management Protocols," Proc. IEEE Symp. on Research in Security and Privacy, pp.182-195, 1991
    • (1991) Proc. IEEE Symp. on Research in Security and Privacy , pp. 182-195
    • Meadows, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.