메뉴 건너뛰기




Volumn 2609, Issue , 2003, Pages 339-355

Environmental requirements for authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 2642523732     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36532-x_21     Document Type: Article
Times cited : (15)

References (28)
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • January
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 84957714601 scopus 로고    scopus 로고
    • Robustness principles for public key protocols
    • Proceedings of Crypto 96, Springer-Verlag
    • Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proceedings of Crypto 96, pages 236-247. Springer-Verlag, LNCS 0963, 1996.
    • (1996) LNCS , vol.963 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Proceedings of Eurocrypt 01. May
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of Eurocrypt 01. LNCS, May 2001.
    • (2001) LNCS
    • Canetti, R.1    Krawczyk, H.2
  • 12
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • August
    • D.E.R. Denning and C.M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, August 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.R.1    Sacco, C.M.2
  • 15
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, IEEE Computer Society Press
    • L. Gong and P. Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society Press, 1998.
    • (1998) Dependable Computing for Critical Applications 5 , pp. 79-100
    • Gong, L.1    Syverson, P.2
  • 16
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • January
    • N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 17
    • 0030709604 scopus 로고    scopus 로고
    • On the importance of securing your bins: The garbage-man-in-the-middle attack
    • ACM Press, April
    • M. Joye and J.-J. Quisquater. On the importance of securing your bins: The garbage-man-in-the-middle attack. In 4th ACM Conference on Computer and Communications Security, pages 135-141. ACM Press, April 1997.
    • (1997) 4th ACM Conference on Computer and Communications Security , pp. 135-141
    • Joye, M.1    Quisquater, J.-J.2
  • 18
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, Springer-Verlag, April
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, volume 1361 of LNCS, pages 91-104. Springer-Verlag, April 1997.
    • (1997) LNCS , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 20
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software - Concepts and Tools, 17:93-102, 1996.
    • (1996) Software - Concepts and Tools , vol.17 , pp. 93-102
    • Lowe, G.1
  • 23
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 24
    • 0033489620 scopus 로고    scopus 로고
    • Paradigm shifts in protocol analysis: Needham and Schroeder again?
    • ACM Computer Society Press, September
    • S. Pancho. Paradigm shifts in protocol analysis: Needham and Schroeder again? In Proceedings of the 1999 New Security Paradigms Workshop. ACM Computer Society Press, September 1999.
    • (1999) Proceedings of the 1999 New Security Paradigms Workshop
    • Pancho, S.1
  • 25
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange (version 4)
    • April
    • V. Shoup. On formal models for secure key exchange (version 4). Available at http://shoup.net/papers/, November 1999. Revision of IBM Research Report RZ 3120 (April 1999).
    • (1999) Revision of IBM Research Report RZ 3120
    • Shoup, V.1
  • 26
    • 0029721958 scopus 로고    scopus 로고
    • Limitations on design principles for public key protocols
    • IEEE Computer Society Press, May
    • P. Syverson Limitations on design principles for public key protocols. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 62-72. IEEE Computer Society Press, May 1996.
    • (1996) Proceedings of the 1996 IEEE Symposium on Security and Privacy , pp. 62-72
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.