-
1
-
-
84879078812
-
Reconciling two views of cryptography
-
Proceedings of the IFIP International Conference on Theoretical Computer Science 2000
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography, in: Proceedings of the IFIP International Conference on Theoretical Computer Science 2000, LNCS Vol. 1872, 2000, pp. 3-22.
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
0033748607
-
New multi-party authentication services and key agreement protocols
-
G. Ateniese, M. Steiner and G. Tsudik, New multi-party authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communication 18(4) (2000), 628-639.
-
(2000)
IEEE Journal on Selected Areas in Communication
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Proceedings of Advances in Cryptology: Crypto'93
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Proceedings of Advances in Cryptology: Crypto'93, LNCS Vol. 773, 1994, pp. 232-249.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Cryptography and Coding
-
S. Blake-Wilson, D. Johnson and A. Menezes. Key agreement protocols and their security analysis, in: Cryptography and Coding, LNCS Vol. 1355, 1997, pp. 30-45.
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
50849127145
-
Provably authenticated group Diffie-Hellman key exchange - The dynamic case
-
Advances in Cryptology - Proceedings of AsiaCrypt 2001, C. Boyd, ed.
-
E. Bresson, O. Chevassut and D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, in: Advances in Cryptology - Proceedings of AsiaCrypt 2001, C. Boyd, ed., LNCS Vol. 2248, 2001. pp. 290-309.
-
(2001)
LNCS
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
6
-
-
50849092893
-
Dynamic group diffie-hellman key exchange under standard assumptions
-
Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen, ed.
-
E. Bresson, O. Chevassut and D. Pointcheval, Dynamic group diffie-hellman key exchange under standard assumptions, in: Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen, ed., LNCS Vol. 2332, 2002, pp. 321-336.
-
(2002)
LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
0035750923
-
The faithfulness of abstract protocol analysis: Message authentication
-
P. Samarati, ed., ACM Press
-
J. Guttman, F.J. Thayer Fábrega and L. Zuck, The faithfulness of abstract protocol analysis: Message authentication, in: Proceedings of the 8th ACM Conference on Computer and Communications Security, P. Samarati, ed., ACM Press, 2001, pp. 186-195.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 186-195
-
-
Guttman, J.1
Thayer Fábrega, F.J.2
Zuck, L.3
-
11
-
-
84904254536
-
Communication-efficient group key agreement
-
Kluwer Publishers
-
Y. Kim, A. Perrig and G. Tsudik, Communication-efficient group key agreement, in: Proceedings of IFIP-SEC 2001, Kluwer Publishers, 2001, pp. 229-244.
-
(2001)
Proceedings of IFIP-SEC 2001
, pp. 229-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
14
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security 6 (1998), 53-84.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: an overview. Journal of Logic Programming 26(2) (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0012795935
-
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
-
C. Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives, in: Proceedings of the Workshop on Issues in the Theory of Security, 2000, pp. 1-4.
-
(2000)
Proceedings of the Workshop on Issues in the Theory of Security
, pp. 1-4
-
-
Meadows, C.1
-
18
-
-
0004192381
-
-
Chapter 12, CRC Press
-
A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, in: Handbook of Applied Cryptography, Chapter 12, CRC Press, 1999, pp. 489-541.
-
(1999)
Handbook of Applied Cryptography
, pp. 489-541
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 (1998), 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
21
-
-
0035072287
-
Athena, a novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin and A. Perrig, Athena, a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
23
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J. Thayer, J.H. Herzog and J. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer, F.J.1
Herzog, J.H.2
Guttman, J.3
|