-
2
-
-
0040496441
-
A logic of authentication
-
Digital Systems Research Center, February
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, Research Report 39, Digital Systems Research Center, February 1989
-
(1989)
Research Report
, vol.39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
84961760201
-
Automatically detecting most vulnerabilities in cryptographic protocols
-
January
-
S. Brackin, Automatically detecting most vulnerabilities in cryptographic protocols, in: DARPA Info Survivability Conf and Expo, January 2000, vol. 1, pp. 222-236
-
(2000)
DARPA Info Survivability Conf and Expo
, vol.1
, pp. 222-236
-
-
Brackin, S.1
-
9
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
Heidelberg, Berlin: Springer Verlag
-
Kelsey J., Schneier B., Wagner D. Protocol interactions and the chosen protocol attack. Lecture Notes in Computer Science. vol. 1361:1998;91-104 Springer Verlag, Heidelberg, Berlin
-
(1998)
Lecture Notes in Computer Science
, vol.1361
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
10
-
-
0032630725
-
Analysis of the Internet key exchange protocol using the NRL protocol analyzer
-
C. Meadows, Analysis of the Internet key exchange protocol using the NRL protocol analyzer, IEEE Symposium on Security and Privacy, 1999
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Meadows, C.1
-
12
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Communications of the ACM. 21(12):1978;993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
13
-
-
0005489522
-
Inductive analysis of the Internet protocol TLS
-
Cambridge University Computer Science Laboratory
-
L.C. Paulson, Inductive analysis of the Internet protocol TLS, Technical Report 440, Cambridge University Computer Science Laboratory, 1998
-
(1998)
Technical Report
, vol.440
-
-
Paulson, L.C.1
-
14
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Mordano, Italy, June 28-30
-
Dawn Xiaodong Song, Athena: a new efficient automatic checker for security protocol analysis, in: 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, June 28-30, 1999
-
(1999)
12th IEEE Computer Security Foundations Workshop
-
-
Song, D.X.1
-
17
-
-
84946432389
-
-
D. Tygar (Ed.) USENIX Workshop on Electronic Commerce USENIX
-
D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol, in: D. Tygar (Ed.), USENIX Workshop on Electronic Commerce, USENIX, 1996, pp. 29-40
-
(1996)
Analysis of the SSL 3.0 Protocol
, pp. 29-40
-
-
Wagner, D.1
Schneier, B.2
-
19
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
February
-
J.G. Steiner, B.C. Neuman, J.I. Schiller, Kerberos: an authentication service for open network systems, in: USENIX Conference Proceedings, February 1988, pp. 183-190
-
(1988)
USENIX Conference Proceedings
, pp. 183-190
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
20
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning D.E., Sacco G.M. Timestamps in key distribution protocols. Communications of the ACM. 24(8):1981;533-536
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
21
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
J. Fegenbaum. Advances in Cryptography - CRYPTO '91. Berlin: Springer Verlag
-
Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R., Yung M. Systematic design of two-party authentication protocols. Fegenbaum J. Advances in Cryptography - CRYPTO '91. Lecture Notes in Computer Science. vol. 576:1992;Springer Verlag, Berlin
-
(1992)
Lecture Notes in Computer Science
, vol.576
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
|