-
2
-
-
0025386404
-
A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989
-
Parts and versions of this material have been presented in many places including Feb. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
-
Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systems, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
-
IEEE Computer Society Press, Los Alamitos, California, May
-
S.M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. In Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pages 72-84. IEEE Computer Society Press, Los Alamitos, California, May 1992.
-
(1992)
Proc. IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
4
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
November
-
S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: a Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. In Proc. First ACM Conference on Computer and Communications Security, pages 244-250, November 1993.
-
(1993)
Proc. First ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
84976665942
-
Timestamps in Key Distribution Protocols
-
August
-
D. E. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536, August 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
6
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Li Gong, Roger Needham, and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society Press, Los Alamitos, California, 1990.
-
(1990)
Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
7
-
-
0025405980
-
A Critique of the Burrows, Abadi, and Needham Logic
-
April
-
D. M. Nessett. A Critique of the Burrows, Abadi, and Needham Logic. Operating Systems Review, 24(2):35-38, April 1990.
-
(1990)
Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
8
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
11
-
-
84974755213
-
Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols
-
Paul F. Syverson. Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security, 1(3):317-334, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3
, pp. 317-334
-
-
Syverson, P.F.1
|