메뉴 건너뛰기




Volumn 1751, Issue , 2000, Pages 196-209

Security of public key certificate based authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CHROMIUM COMPOUNDS; MODEL CHECKING;

EID: 22844457244     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-46588-1_14     Document Type: Conference Paper
Times cited : (6)

References (15)
  • 1
    • 0004215976 scopus 로고
    • A logic of authentication
    • DEC Systems Research Center, February
    • M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, February 1989.
    • (1989) Technical Report 39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 10
    • 0025405980 scopus 로고
    • A critique of the burrows, abadi and needham logic
    • D. Nessett. A critique of the burrows, abadi and needham logic. ACM Operating Systems Review, 24(2):35–38, April 1990.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.1
  • 11
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85–128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.