-
1
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
3
-
-
0000580723
-
Formal analysis of authentication protocols
-
Chinese source
-
Qing SH. Formal analysis of authentication protocols. Journal of Software, 1996,7(Supplement): 107-114 (in Chinese with English abstract).
-
(1996)
Journal of Software
, vol.7
, Issue.SUPPL.
, pp. 107-114
-
-
Qing, S.H.1
-
4
-
-
0023247970
-
Efficient and timely mutual authentication
-
Otway D, Rees O. Efficient and timely mutual authentication. Operating Systems Review, 1987, 21(1): 8-10.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
6
-
-
0003700417
-
Kerberos authentication and authorization system
-
Project Athena Technical Plan Section E.2.1, MIT
-
Miller SP, Neuman C, Schiller JI, Saltzer JH. Kerberos authentication and authorization system. Project Athena Technical Plan Section E.2.1, MIT, 1987.
-
(1987)
-
-
Miller, S.P.1
Neuman, C.2
Schiller, J.I.3
Saltzer, J.H.4
-
8
-
-
0003568551
-
A survey of authentication protocol literature: Version 1.0.
-
Clark J, Jacob J. A survey of authentication protocol literature: Version 1.0. 1997. http://www-users.cs.york.ac.uk/-jac/under the link Security Protocols Review.
-
(1997)
-
-
Clark, J.1
Jacob, J.2
-
9
-
-
0003765597
-
Information technology-security techniques-entity authentication mechanisms part 2: Entity authentication using symmetric techniques
-
ISO/IEC
-
ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 2: Entity authentication using symmetric techniques. 1993.
-
(1993)
-
-
-
10
-
-
24844436122
-
Integrating security in a large distributed system
-
Technical Report, CMU-CS, CMU
-
Satyanarayanan M. Integrating security in a large distributed system. Technical Report, CMU-CS, CMU, 1987. 87-179.
-
(1987)
, pp. 87-179
-
-
Satyanarayanan, M.1
-
11
-
-
0003765597
-
Information technology-security techniques-entity authentication mechanisms part 4: Entity authentication using cryptographic check functions
-
ISO/IEC
-
ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 4: Entity authentication using cryptographic check functions. 1993.
-
(1993)
-
-
-
12
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning D, Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981, 24(8): 533-536.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
13
-
-
0002508587
-
A lesson on authentication protocol design
-
Woo T, Lam S. A lesson on authentication protocol design. Operating Systems Review, 1994, 28(3): 24-37.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.1
Lam, S.2
-
15
-
-
0038824488
-
An efficient and secure authentication protocol using uncertified keys
-
Kao IL, Chow R. An efficient and secure authentication protocol using uncertified keys. Operating Systems Review, 1995, 29(3): 14-21..
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 14-21
-
-
Kao, I.L.1
Chow, R.2
-
16
-
-
0003765597
-
Information technology-security techniques-entity authentication mechanisms part 3: Entity authentication using a public key algorithm
-
ISO/IEC
-
ISO/IEC. Information technology-security techniques-entity authentication mechanisms part 3: Entity authentication using a public key algorithm. 1995.
-
(1995)
-
-
-
18
-
-
0025522255
-
Hidden assumptions in cryptographic protocols
-
Boyd C. Hidden assumptions in cryptographic protocols. Proceedings of the IEE, 1990, 137(6): 433-436.
-
(1990)
Proceedings of the IEE
, vol.137
, Issue.6
, pp. 433-436
-
-
Boyd, C.1
-
19
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FOR
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FOR. Software-Concepts and Tools, 1996, 17: 93-102.
-
(1996)
Software-Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
21
-
-
0025405980
-
A critique of the burrows, Abadi and Needham logic
-
Nessett DM. A critique of the burrows, Abadi and Needham logic. ACM Operating Systems Review, 1990, 24(2): 35-38.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
22
-
-
0011936788
-
Rejoinder to nessett
-
Burrows M, Abadi M, Needham R. Rejoinder to Nessett. Operating Systems Review, 1990, 24(2): 39-40.
-
(1990)
Operating Systems Review
, vol.24
, Issue.2
, pp. 39-40
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
24
-
-
1442295999
-
Using CSP for protocol analysis: The Needham-Schroeder public-key protocol
-
Technical Report, CSD-TR-96-14, Royal Holloway: University of London
-
Schneider SA. Using CSP for protocol analysis: The Needham-Schroeder public-key protocol. Technical Report, CSD-TR-96-14, Royal Holloway: University of London, 1996.
-
(1996)
-
-
Schneider, S.A.1
-
30
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
Thayer FJ, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999, 7(2-3): 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
32
-
-
0033682447
-
Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement
-
IEEE Computer Society Press
-
Perrig A, Song D. Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2000. 64-76.
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
, pp. 64-76
-
-
Perrig, A.1
Song, D.2
-
33
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Los Alamitos: IEEE Computer Society Press
-
Song D. Athena: A new efficient automatic checker for security protocol analysis. In: Proceedings of the 1999 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202.
-
(1999)
Proceedings of the 1999 IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
-
35
-
-
0029713154
-
What do we mean by entity authentication
-
Los Alamitos: IEEE Computer Society Press
-
Gollmann D. What do we mean by entity authentication? In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1996. 46-54.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 46-54
-
-
Gollmann, D.1
-
37
-
-
84974755213
-
Knowledge, belief, and semantics in the analysis of cryptographic protocols
-
Syverson P. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1992, 1(3): 317-334.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3
, pp. 317-334
-
-
Syverson, P.1
-
41
-
-
0025641513
-
A logic of communication in a hostile environment
-
Los Alamitos: IEEE Computer Society Press
-
Bieber P. A Logic of Communication in a Hostile Environment. In: Proceedings of the Computer Security Foundations Workshop III. Los Alamitos: IEEE Computer Society Press, 1990. 14-22.
-
(1990)
Proceedings of the Computer Security Foundations Workshop III
, pp. 14-22
-
-
Bieber, P.1
-
42
-
-
0025694648
-
Formal semantics for logics of cryptographic protocols
-
Los Alamitos: IEEE Computer Society Press
-
Syverson P. Formal semantics for logics of cryptographic protocols. In: Proceedings of the Computer Security Foundations Workshop III. Los Alamitos: IEEE Computer Society Press. 1990. 32-41.
-
(1990)
Proceedings of the Computer Security Foundations Workshop III
, pp. 32-41
-
-
Syverson, P.1
-
43
-
-
0023868045
-
An axiomatic basis of trust in distributed systems
-
Los Alamitos: IEEE Computer Society Press
-
Rangan PV. An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1988. 204-211.
-
(1988)
Proceedings of the 1988 Symposium on Security and Privacy
, pp. 204-211
-
-
Rangan, P.V.1
-
44
-
-
0024928980
-
A logic of knowledge and belief for reasoning about computer security
-
Los Alamitos: IEEE Computer Society Press
-
Moser L. A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II. Los Alamitos: IEEE Computer Society Press, 1989. 57-63.
-
(1989)
Proceedings of the Computer Security Foundations Workshop II
, pp. 57-63
-
-
Moser, L.1
-
45
-
-
0027266208
-
Trust relationships in secure systems: A distributed authentication perspective
-
Los Alamitos: IEEE Computer Society Press
-
Yahalom R, Klein B, Beth T. Trust relationships in secure systems: A distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150-164.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 150-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
47
-
-
0003850592
-
Theory generation for security protocols
-
Pittsburgh: Computer Science Department, Carnegie Mellon University
-
Kindred D. Theory generation for security protocols [Ph.D. Thesis]. Pittsburgh: Computer Science Department, Carnegie Mellon University, 1999.
-
(1999)
-
-
Kindred, D.1
-
50
-
-
0034309559
-
A new non-repudiation protocol
-
Chinese source
-
Qing SH. A new non-repudiation protocol. Journal of Software, 2000, 11(10): 1338-1343 (in Chinese with English abstract).
-
(2000)
Journal of Software
, vol.11
, Issue.10
, pp. 1338-1343
-
-
Qing, S.H.1
-
51
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
52
-
-
0032630725
-
Analysis of the Internet key exchange protocol using the NRL protocol analyzer
-
Los Alamitos: IEEE Computer Society Press
-
Meadows C. Analysis of the Internet key exchange protocol using the NRL protocol analyzer. In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1999. 84-89.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 84-89
-
-
Meadows, C.1
-
55
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer R, Meadows C, Millen J. Three systems for cryptographic protocol analysis. Journal of Cryptology, 1994, 7(2): 251-260.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 251-260
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
56
-
-
0030696539
-
Mechanized proofs for a recursive authentication protocol
-
Los Alamitos: IEEE Computer Society Press
-
Paulson LC. Mechanized proofs for a recursive authentication protocol. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1997. 84-94.
-
(1997)
Proceedings of the 10th IEEE Computer Security Foundations Workshop
, pp. 84-94
-
-
Paulson, L.C.1
-
57
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, (6): 85-128.
-
(1998)
Journal of Computer Security
, Issue.6
, pp. 85-128
-
-
Paulson, L.C.1
-
58
-
-
44049113210
-
A calculus of mobile processes
-
Milner R, Parrow J, Walker D. A calculus of mobile processes. Information and Computation, 1992, 100(1): 1-77.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
60
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Berlin: Springer-Verlag
-
Amadio R, Lugiez D. On the reachability problem in cryptographic protocols. In: Proceedings of the CONCUR. Berlin: Springer-Verlag, 2000. 380-394.
-
(2000)
Proceedings of the CONCUR
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
62
-
-
84958762859
-
The game of the name in cryptographic tables
-
Berlin: Springer-Verlag
-
Amadio R, Prasad S. The game of the name in cryptographic tables. In: Proceedings of the ASIAN'99. Berlin: Springer-Verlag, 1999. 15-26.
-
(1999)
Proceedings of the ASIAN'99
, pp. 15-26
-
-
Amadio, R.1
Prasad, S.2
-
63
-
-
0001566477
-
Formal verification of cryptographic protocols: A survey
-
Berlin: Springer-Verlag
-
Meadows C. Formal verification of cryptographic protocols: A survey. In: Advances in Cryptology, Asiacrypt'96 Proceedings. Berlin: Springer-Verlag, 1996. 135-150.
-
(1996)
Advances in Cryptology, Asiacrypt'96 Proceedings
, pp. 135-150
-
-
Meadows, C.1
-
66
-
-
0027969914
-
Prudent engineering practices for cryptographic protocols
-
Los Alamitos: IEEE Computer Society Press
-
Abadi M, Needham R. Prudent engineering practices for cryptographic protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1994. 122-136.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Security and Privacy
, pp. 122-136
-
-
Abadi, M.1
Needham, R.2
-
68
-
-
0003684287
-
CAPSL: Common authentication protocol specification language
-
Technical Report, MP 97B48, The MITRE Corporation
-
Millen JK. CAPSL: Common authentication protocol specification language. Technical Report, MP 97B48, The MITRE Corporation, 1997.
-
(1997)
-
-
Millen, J.K.1
-
70
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
Syverson P. On key distribution protocols for repeated authentication. Operating Systems Review, 1993, 27(4): 24-30.
-
(1993)
Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.1
-
72
-
-
0034928643
-
Some new attacks upon authentication protocols
-
Chinese source
-
Wang GL, Qing SH, Zhou, ZF. Some new attacks upon authentication protocols. Journal of Software, 2001, 12(6): 907-913 (in Chinese with English abstract).
-
(2001)
Journal of Software
, vol.12
, Issue.6
, pp. 907-913
-
-
Wang, G.L.1
Qing, S.H.2
Zhou, Z.F.3
-
73
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
Los Alamitos: IEEE Computer Society Press
-
Meadows C. Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of the DARPA Information Survivability Conference and Exposition. Los Alamitos: IEEE Computer Society Press, 2000. 237-250.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 237-250
-
-
Meadows, C.1
-
74
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
Los Alamitos: IEEE Computer Society Press
-
Kailar R. Reasoning about accountability in protocols for electronic commerce. In: Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1995. 236-250.
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 236-250
-
-
Kailar, R.1
-
75
-
-
0000260312
-
Limitations of Kailar logic
-
Chinese source
-
Zhou DC, Qing SH, Zhou ZF. Limitations of Kailar logic. Journal of Software, 1999, 10(12): 1238-1245 (in Chinese with English abstract).
-
(1999)
Journal of Software
, vol.10
, Issue.12
, pp. 1238-1245
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
-
76
-
-
0035467046
-
A new approach for the analysis of electronic commerce protocols
-
Chinese source
-
Zhou DC, Qing SH, Zhou ZF. A new approach for the analysis of electronic commerce protocols. Journal of Software, 2001, 12(9): 1318-1328 (in Chinese with English abstract).
-
(2001)
Journal of Software
, vol.12
, Issue.9
, pp. 1318-1328
-
-
Zhou, D.C.1
Qing, S.H.2
Zhou, Z.F.3
-
77
-
-
0142124067
-
Design and logical analysis of security protocols
-
Chinese source
-
Qing SH. Design and logical analysis of security protocols. Journal of Software, 2003, 14(7): 1300-1309 (in Chinese with English abstract).
-
(2003)
Journal of Software
, vol.14
, Issue.7
, pp. 1300-1309
-
-
Qing, S.H.1
|