메뉴 건너뛰기




Volumn 30, Issue 3, 1996, Pages 1-4

A new look at an old protocol

Author keywords

[No Author keywords available]

Indexed keywords


EID: 2842611393     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/230908.230911     Document Type: Article
Times cited : (3)

References (13)
  • 2
    • 0025386404 scopus 로고
    • A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989
    • Parts and versions of this material have been presented in many places including Feb. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
    • Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
    • IEEE Computer Society Press, Los Alamitos, California, May
    • S.M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. In Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pages 72-84. IEEE Computer Society Press, Los Alamitos, California, May 1992.
    • (1992) Proc. IEEE Computer Society Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
    • November
    • S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: a Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. In Proc. First ACM Conference on Computer and Communications Security, pages 244-250, November 1993.
    • (1993) Proc. First ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 84976665942 scopus 로고
    • Timestamps in Key Distribution Protocols
    • August
    • D. E. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536, August 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0025405980 scopus 로고
    • A Critique of the Burrows, Abadi, and Needham Logic
    • April
    • D. M. Nessett. A Critique of the Burrows, Abadi, and Needham Logic. Operating Systems Review, 24(2):35-38, April 1990.
    • (1990) Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 8
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December
    • R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 11
    • 84974755213 scopus 로고
    • Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols
    • Paul F. Syverson. Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security, 1(3):317-334, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.3 , pp. 317-334
    • Syverson, P.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.