메뉴 건너뛰기




Volumn 21, Issue 1, 2005, Pages 59-84

On preventing type flaw attacks on security protocols with a simplified tagging scheme

Author keywords

Network security; Security protocol; Strand space; Tagging; Type flaw

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER SCIENCE; CRYPTOGRAPHY; HIERARCHICAL SYSTEMS; SECURITY OF DATA;

EID: 12744277366     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (9)
  • 5
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroder public-key protocol: A comparison of two approaches
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, ed., LNCS 1146
    • C. A. Meadows, "Analyzing the Needham-Schroder public-key protocol: a comparison of two approaches," in E. Bertino, H. Kurth, G. Martella, and E. Montolivo, ed., ESORICS '96, LNCS 1146, 1996, pp. 351-346.
    • (1996) ESORICS '96 , pp. 351-1346
    • Meadows, C.A.1
  • 6
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, 1978, pp. 993-999.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 9
    • 0002508587 scopus 로고
    • A lesson on authentication protocol design
    • T. Y. C. Woo and S. S. Lam, "A lesson on authentication protocol design," ACM Operating Systems Reviews, Vol. 28, 1994, pp. 24-37.
    • (1994) ACM Operating Systems Reviews , vol.28 , pp. 24-37
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.