메뉴 건너뛰기




Volumn 1172, Issue , 1996, Pages 146-157

A framework for design of key establishment protocols

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35048851277     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0023295     Document Type: Conference Paper
Times cited : (4)

References (11)
  • 1
    • 33745715734 scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • June
    • M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols", DEC SRC Research Report 125. June 1994.
    • (1994) DEC SRC Research Report , vol.125
    • Abadi, M.1    Needham, R.2
  • 3
    • 0029718780 scopus 로고    scopus 로고
    • A Class of Flexible and Efficient Key Management Protocol
    • IEEE Press
    • C. Boyd, "A Class of Flexible and Efficient Key Management Protocol", IEEE Security Foundations Workshop, IEEE Press, 1996, pp. 2-8.
    • (1996) IEEE Security Foundations Workshop , pp. 2-8
    • Boyd, C.1
  • 6
    • 0029543006 scopus 로고
    • Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations
    • L. Gong, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations", Distributed Computing, 9(3), 1995.
    • (1995) Distributed Computing , vol.9 , Issue.3
    • Gong, L.1
  • 7
    • 0347470584 scopus 로고
    • Fail-Stop Protocols: An Approach to Designing Secure Protocols
    • September
    • L. Gong and P. Syverson, "Fail-Stop Protocols: An Approach to Designing Secure Protocols", Proceedings of IFIP DCCA-5, Illinois, September 1995. (Available as http://www.csl.sri.com/~gong/failstop-protocols.ps.gz.)
    • (1995) Proceedings of IFIP DCCA-5, Illinois
    • Gong, L.1    Syverson, P.2
  • 8
    • 0029346019 scopus 로고
    • Methodical Use of Cryptographic Transformations in Authentication Protocols
    • July
    • W. Mao and C. Boyd, "Methodical Use of Cryptographic Transformations in Authentication Protocols", IEE Proceedings - Computers and Digital Techniques, 142, 4, July 1995. pp. 272-278.
    • (1995) IEE Proceedings - Computers and Digital Techniques , vol.142 , Issue.4 , pp. 272-278
    • Mao, W.1    Boyd, C.2
  • 9
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December
    • R. M. Needham & M. D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, 21, 12, December 1978, 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 10
    • 0028385109 scopus 로고
    • Three Systems for Cryptographic Protocols Analysis
    • Spring
    • R. Kemmerer, C. Meadows and J. Millen, "Three Systems for Cryptographic Protocols Analysis", Journal of Cryptology, 7, 2, Spring 1994, pp. 79-130.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.