메뉴 건너뛰기




Volumn 32, Issue , 2000, Pages 42-58

On the verification of cryptographic protocols: A tale of two committees

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DATA TRANSFER; DEMODULATION; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; PROGRAM INTERPRETERS; ROBUSTNESS (CONTROL SYSTEMS);

EID: 19144370194     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)00094-5     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer Verlag
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, LNCS 773, PAGES 232-249. Springer Verlag, 1994.
    • (1994) Advances in Cryptology - CRYPTO'93, LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 19144364252 scopus 로고
    • Proving authentication protocols - What do authentication protocols prove?
    • C.J. Mitchell, & V. Stavridou. Clarendon Press
    • Gollmann Dieter. Proving authentication protocols - what do authentication protocols prove? Mitchell C.J., Stavridou V. Mathematics of Dependable systems. 1995;95-102 Clarendon Press
    • (1995) Mathematics of Dependable Systems , pp. 95-102
    • Gollmann, D.1
  • 7
    • 84944890703 scopus 로고    scopus 로고
    • Insider fraud
    • B. Christiansen et al. (eds.), LNCS 1550 Springer Verlag
    • Dieter Gollmann. Insider fraud. In Proceedings of the Cambridge Security Protocols Workshop, B. Christiansen et al. (eds.), LNCS 1550, pages 213-219. Springer Verlag, 1999.
    • (1999) Proceedings of the Cambridge Security Protocols Workshop , pp. 213-219
    • Gollmann, D.1
  • 13
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe Gavin. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters. 56:(3):1995;131-133
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 14
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham - Schroeder public-key protocol using FDR
    • Springer Verlag
    • Gavin Lowe. Breaking and fixing the Needham - Schroeder public-key protocol using FDR. In Proceedings of TACAS, LNCS 1055, pages 147-166. Springer Verlag, 1996.
    • (1996) Proceedings of TACAS, LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 17
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the needham-schroeder public key protocol: A comparison of two approaches
    • Proceedings ESORICS'96 E. Bertino et al. (eds) Springer Verlag
    • Catherine A. Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Proceedings ESORICS'96, E. Bertino et al. (eds), LNCS 1146, pages 351-364. Springer Verlag, 1996.
    • (1996) LNCS , vol.1146 , pp. 351-364
    • Meadows, C.A.1
  • 19
    • 19144365899 scopus 로고
    • Standardising authentication protocols based on public key techniques
    • Mitchell Christopher J., Thomas Andrew. Standardising authentication protocols based on public key techniques. Journal of Computer Seurity. 2:1993;23-36
    • (1993) Journal of Computer Seurity , vol.2 , pp. 23-36
    • Mitchell, C.J.1    Thomas, A.2
  • 20
    • 0018048246 scopus 로고
    • Using encryption for authentication in large network of computer
    • Needham Roger M., Schroeder Michael D. Using encryption for authentication in large network of computer. Communications of the ACM. 21:1978;993
    • (1978) Communications of the ACM , vol.21 , pp. 993
    • Needham, R.M.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.