-
1
-
-
33745715734
-
Prudent Engineering Practice for Cryptographic Protocols
-
June
-
M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols", DEC SRC Research Report 125. June 1994.
-
(1994)
DEC SRC Research Report
, vol.125
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
77955516185
-
Keyed Hash Functions
-
Springer-Verlag
-
S. Bakhtiari, R. Safavi-Naini and J. Pieprzyk, "Keyed Hash Functions", Cryptography: Policy and Algorithms, Springer-Verlag, 1996, pp. 201-214.
-
(1996)
Cryptography: Policy and Algorithms
, pp. 201-214
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
3
-
-
0029718780
-
A Class of Flexible and Efficient Key Management Protocol
-
IEEE Press
-
C. Boyd, "A Class of Flexible and Efficient Key Management Protocol", IEEE Security Foundations Workshop, IEEE Press, 1996, pp. 2-8.
-
(1996)
IEEE Security Foundations Workshop
, pp. 2-8
-
-
Boyd, C.1
-
4
-
-
0025386404
-
A Logic of Authentication
-
February
-
M. Burrows, M. Abadi, and R.M. Needham, "A Logic of Authentication", ACM Transactions on Computer Systems, Vol 8, 1, February 1990, pp 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
6
-
-
0029543006
-
Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations
-
L. Gong, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations", Distributed Computing, 9(3), 1995.
-
(1995)
Distributed Computing
, vol.9
, Issue.3
-
-
Gong, L.1
-
7
-
-
0347470584
-
Fail-Stop Protocols: An Approach to Designing Secure Protocols
-
September
-
L. Gong and P. Syverson, "Fail-Stop Protocols: An Approach to Designing Secure Protocols", Proceedings of IFIP DCCA-5, Illinois, September 1995. (Available as http://www.csl.sri.com/~gong/failstop-protocols.ps.gz.)
-
(1995)
Proceedings of IFIP DCCA-5, Illinois
-
-
Gong, L.1
Syverson, P.2
-
8
-
-
0029346019
-
Methodical Use of Cryptographic Transformations in Authentication Protocols
-
July
-
W. Mao and C. Boyd, "Methodical Use of Cryptographic Transformations in Authentication Protocols", IEE Proceedings - Computers and Digital Techniques, 142, 4, July 1995. pp. 272-278.
-
(1995)
IEE Proceedings - Computers and Digital Techniques
, vol.142
, Issue.4
, pp. 272-278
-
-
Mao, W.1
Boyd, C.2
-
9
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
R. M. Needham & M. D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, 21, 12, December 1978, 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
10
-
-
0028385109
-
Three Systems for Cryptographic Protocols Analysis
-
Spring
-
R. Kemmerer, C. Meadows and J. Millen, "Three Systems for Cryptographic Protocols Analysis", Journal of Cryptology, 7, 2, Spring 1994, pp. 79-130.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
|