-
2
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
January
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
84957714601
-
Robustness principles for public key protocols
-
Proceedings of Crypto 96, Springer-Verlag
-
Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proceedings of Crypto 96, pages 236-247. Springer-Verlag, LNCS 0963, 1996.
-
(1996)
LNCS
, vol.963
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
5
-
-
0012842066
-
-
October draft-benaloh-pct-00.txt
-
J. Benaloh, B. Lampson, D. Simon, T. Spies, and B. Yee. The private communication technology protocol, October 1995. draft-benaloh-pct-00.txt.
-
(1995)
The Private Communication Technology Protocol
-
-
Benaloh, J.1
Lampson, B.2
Simon, D.3
Spies, T.4
Yee, B.5
-
6
-
-
0041486245
-
Systematic design of two-party authentication protocols
-
Springer-Verlag
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Advances in Cryptology - Proceedings of CRYPTO 91. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Proceedings of CRYPTO 91
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Proceedings of Eurocrypt 01. May
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of Eurocrypt 01. LNCS, May 2001.
-
(2001)
LNCS
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
84976665942
-
Timestamps in key distribution protocols
-
August
-
D.E.R. Denning and C.M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, August 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.R.1
Sacco, C.M.2
-
13
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
15
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, IEEE Computer Society Press
-
L. Gong and P. Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society Press, 1998.
-
(1998)
Dependable Computing for Critical Applications 5
, pp. 79-100
-
-
Gong, L.1
Syverson, P.2
-
16
-
-
0001924088
-
A model for secure protocols and their composition
-
January
-
N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
18
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, Springer-Verlag, April
-
J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, volume 1361 of LNCS, pages 91-104. Springer-Verlag, April 1997.
-
(1997)
LNCS
, vol.1361
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
20
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software - Concepts and Tools, 17:93-102, 1996.
-
(1996)
Software - Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
23
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
24
-
-
0033489620
-
Paradigm shifts in protocol analysis: Needham and Schroeder again?
-
ACM Computer Society Press, September
-
S. Pancho. Paradigm shifts in protocol analysis: Needham and Schroeder again? In Proceedings of the 1999 New Security Paradigms Workshop. ACM Computer Society Press, September 1999.
-
(1999)
Proceedings of the 1999 New Security Paradigms Workshop
-
-
Pancho, S.1
-
25
-
-
0004023090
-
On formal models for secure key exchange (version 4)
-
April
-
V. Shoup. On formal models for secure key exchange (version 4). Available at http://shoup.net/papers/, November 1999. Revision of IBM Research Report RZ 3120 (April 1999).
-
(1999)
Revision of IBM Research Report RZ 3120
-
-
Shoup, V.1
-
26
-
-
0029721958
-
Limitations on design principles for public key protocols
-
IEEE Computer Society Press, May
-
P. Syverson Limitations on design principles for public key protocols. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 62-72. IEEE Computer Society Press, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 62-72
-
-
Syverson, P.1
|