메뉴 건너뛰기




Volumn 45, Issue , 2001, Pages 141-161

Key compromise, strand spaces, and the authentication tests

Author keywords

Authentication; Authentication tests; Bundles; Cryptographic protocols; Key compromise; Strand spaces

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTATIONAL GEOMETRY; COMPUTER SCIENCE; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 18944391675     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)80960-5     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 3
    • 0003185332 scopus 로고
    • February
    • in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.1 , pp. 18-36
  • 6
    • 0012841819 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • R. Gorrieri, & R. Focardi. LNCS 2171. Springer Verlag. Forthcoming
    • Guttman J.D. Security goals: Packet trajectories and strand spaces. Gorrieri R., Focardi R. Foundations of Security Analysis and Design. LNCS 2171 :2001;Springer Verlag. Forthcoming
    • (2001) Foundations of Security Analysis and Design
    • Guttman, J.D.1
  • 11
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings of TACAS
    • Lowe G., Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceedings of TACAS, Lecture Notes in Computer Science 1055 (1996), pp. 147-166.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 15
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM. 21:1978
    • (1978) Communications of the ACM , vol.21
    • Needham, R.1    Schroeder, M.2
  • 16
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • Otway D., Rees O. Efficient and timely mutual authentication. Operating Systems Review. 21:1987;8-10
    • (1987) Operating Systems Review , vol.21 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 17
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • also Report 443, Cambridge University Computer Lab
    • Paulson, L. C., The inductive approach to verifying cryptographic protocols, Journal of Computer Security (1998), also Report 443, Cambridge University Computer Lab.
    • (1998) Journal of Computer Security
    • Paulson, L.C.1
  • 18
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • Paulson, L. C., Relations between secrets: Two formal analyses of the Yahalom protocol, Journal of Computer Security (2001)
    • (2001) Journal of Computer Security
    • Paulson, L.C.1
  • 20
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
    • Perrig A. and D. X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000).
    • (2000) Proceedings of the 13th IEEE Computer Security Foundations Workshop
    • Perrig, A.1    Song, D.X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.