-
1
-
-
84945119254
-
Entity authentication and key distribution
-
Springer Verlag
-
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, LNCS 773, PAGES 232-249. Springer Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO'93, LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
Bird Ray, Gopal I., Herzberg Amir, Janson Philippe A., Kutten Shay, Molva Refik, Yung Moti. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications. 11:(5):June 1993;679-693
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Springer Verlag
-
Bird Ray, Gopal Inder, Herzberg amir, Janson Phil, Kutten shay, Molva Refik, Yung Moti. Systematic design of two-party authentication protocols. Advances in Cryptology - CRYPTO'91, LNCS 576. 1992;44-61 Springer Verlag
-
(1992)
Advances in Cryptology - CRYPTO'91, LNCS 576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie Whitfield, Paul van Oorschot C., Michael Wiener J. Authentication and authenticated key exchanges. Designs, Codes, Codes and Cryptography. 2:1992;107-125
-
(1992)
Designs, Codes, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Paul Van Oorschot, C.2
Michael Wiener, J.3
-
6
-
-
19144364252
-
Proving authentication protocols - What do authentication protocols prove?
-
C.J. Mitchell, & V. Stavridou. Clarendon Press
-
Gollmann Dieter. Proving authentication protocols - what do authentication protocols prove? Mitchell C.J., Stavridou V. Mathematics of Dependable systems. 1995;95-102 Clarendon Press
-
(1995)
Mathematics of Dependable Systems
, pp. 95-102
-
-
Gollmann, D.1
-
7
-
-
84944890703
-
Insider fraud
-
B. Christiansen et al. (eds.), LNCS 1550 Springer Verlag
-
Dieter Gollmann. Insider fraud. In Proceedings of the Cambridge Security Protocols Workshop, B. Christiansen et al. (eds.), LNCS 1550, pages 213-219. Springer Verlag, 1999.
-
(1999)
Proceedings of the Cambridge Security Protocols Workshop
, pp. 213-219
-
-
Gollmann, D.1
-
12
-
-
84976834054
-
Authentication in distributed systems; Theory and practice
-
Lampson Butler, Abadi Martín, Burrows Michael, Wobber Edward. Authentication in distributed systems; Theory and practice. ACM Transactions on Computer Systems. 10:(4):November 1992;265-310
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
13
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe Gavin. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters. 56:(3):1995;131-133
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
14
-
-
0342658605
-
Breaking and fixing the Needham - Schroeder public-key protocol using FDR
-
Springer Verlag
-
Gavin Lowe. Breaking and fixing the Needham - Schroeder public-key protocol using FDR. In Proceedings of TACAS, LNCS 1055, pages 147-166. Springer Verlag, 1996.
-
(1996)
Proceedings of TACAS, LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
84949740740
-
Analyzing the needham-schroeder public key protocol: A comparison of two approaches
-
Proceedings ESORICS'96 E. Bertino et al. (eds) Springer Verlag
-
Catherine A. Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Proceedings ESORICS'96, E. Bertino et al. (eds), LNCS 1146, pages 351-364. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 351-364
-
-
Meadows, C.A.1
-
19
-
-
19144365899
-
Standardising authentication protocols based on public key techniques
-
Mitchell Christopher J., Thomas Andrew. Standardising authentication protocols based on public key techniques. Journal of Computer Seurity. 2:1993;23-36
-
(1993)
Journal of Computer Seurity
, vol.2
, pp. 23-36
-
-
Mitchell, C.J.1
Thomas, A.2
-
20
-
-
0018048246
-
Using encryption for authentication in large network of computer
-
Needham Roger M., Schroeder Michael D. Using encryption for authentication in large network of computer. Communications of the ACM. 21:1978;993
-
(1978)
Communications of the ACM
, vol.21
, pp. 993
-
-
Needham, R.M.1
Schroeder, M.D.2
|