메뉴 건너뛰기




Volumn 32, Issue 4, 1998, Pages 21-24

Fixing a problem in the Helsinki protocol

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0345412448     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/302350.302356     Document Type: Article
Times cited : (32)

References (7)
  • 2
    • 0032545823 scopus 로고    scopus 로고
    • Weakness in the Helsinki protocol
    • G. Horng and C.-K. Hsu. Weakness in the Helsinki protocol. Electronics Letters, 34:354-355, 1998.
    • (1998) Electronics Letters , vol.34 , pp. 354-355
    • Horng, G.1    Hsu, C.-K.2
  • 4
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 5
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Margaria and Steffen, editors, number 1055 in Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Margaria and Steffen, editors, Tools and algorithms for the construction and analysis of systems, number 1055 in Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, Berlin, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems , pp. 147-166
    • Lowe, G.1
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21:993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.