-
1
-
-
0025522255
-
Hidden assumptions in cryptographic protocols
-
Colin Boyd. Hidden assumptions in cryptographic protocols. Proceedings of the IEE, 137, Part E(6):433-436, November 1990.
-
(1990)
Proceedings of the IEE
, vol.137
, Issue.6
, pp. 433-436
-
-
Boyd, C.1
-
2
-
-
0004215976
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39
-
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, 1989.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
84976665942
-
Timestamps in key distribution protocols
-
Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
5
-
-
84958790135
-
-
Formal Systems (Europe) Ltd. Failures Divergence Refinement--User Manual and Tutorial, 1993. Version 1.3
-
Formal Systems (Europe) Ltd. Failures Divergence Refinement--User Manual and Tutorial, 1993. Version 1.3.
-
-
-
-
7
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
8
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
11
-
-
0001789630
-
Model-checking CSP
-
Essays in Honour of C. A. R. Hoare. Prentice-Hall
-
A. W. Roscoe. Model-checking CSP. In A Classical Mind, Essays in Honour of C. A. R. Hoare. Prentice-Hall, 1994.
-
(1994)
A Classical Mind
-
-
Roscoe, A.W.1
-
13
-
-
84969351014
-
Security properties and CSP
-
Steve Schneider. Security properties and CSP. In preparation, 1995.
-
(1995)
Preparation
-
-
Schneider, S.1
|