-
1
-
-
28144446331
-
-
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5) (2005), http://www.ietf.org/rfc/rfc4120
-
(2005)
The Kerberos Network Authentication Service (V5)
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
4
-
-
49949116722
-
-
Strasser, M., Steffen, A.: Kerberos PKINIT Implementation for Unix Clients. Technical report, Zurich University of Applied Sciences Winterthur (2002)
-
Strasser, M., Steffen, A.: Kerberos PKINIT Implementation for Unix Clients. Technical report, Zurich University of Applied Sciences Winterthur (2002)
-
-
-
-
5
-
-
49949120078
-
-
CERT
-
CERT: Vulnerability Note 477341 (2005), http://www.kb.cert.org/vuls/id/ 477341
-
(2005)
Vulnerability Note 477341
-
-
-
6
-
-
49949098433
-
-
Yu, T, Hartman, S, Raeburn, K, The perils of unauthenticated encryption: Kerberos version 4. In: Proc. NDSS 2004 2004
-
Yu, T., Hartman, S., Raeburn, K.: The perils of unauthenticated encryption: Kerberos version 4. In: Proc. NDSS 2004 (2004)
-
-
-
-
7
-
-
33750568156
-
Formal Analysis of Kerberos 5
-
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A., Walstad, C.: Formal Analysis of Kerberos 5. Theoretical Computer Science 367, 57-87 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, pp. 57-87
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Walstad, C.5
-
8
-
-
33750238106
-
Specifying Kerberos 5 Cross-Realm Authentication
-
Cervesato, I., Jaggard, A.D., Scedrov, A., Walstad, C.: Specifying Kerberos 5 Cross-Realm Authentication. In: Proc. WITS 2005, ACM Digital Lib. pp. 12-26 (2005)
-
(2005)
Proc. WITS 2005, ACM Digital Lib
, pp. 12-26
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Walstad, C.4
-
9
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptology 7, 79-130 (1994)
-
(1994)
J. Cryptology
, vol.7
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
10
-
-
0032630725
-
Analysis of the internet key exchange protocol using the nrl protocol analyzer
-
Meadows, C.: Analysis of the internet key exchange protocol using the nrl protocol analyzer. In: Proc. IEEE Symp. Security and Privacy, pp. 216-231 (1999)
-
(1999)
Proc. IEEE Symp. Security and Privacy
, pp. 216-231
-
-
Meadows, C.1
-
12
-
-
33750226088
-
Cryptographically Sound Security Proofs for Basic and Public-key Kerberos
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.K.: Cryptographically Sound Security Proofs for Basic and Public-key Kerberos. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
-
-
Backes, M.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Tsay, J.K.5
-
13
-
-
77956142065
-
-
IETF:, RFC 4556. Preliminary versions available as a sequence of Internet Drafts at
-
IETF: Public Key Cryptography for Initial Authentication in Kerberos (1996-2006) RFC 4556. Preliminary versions available as a sequence of Internet Drafts at, http://tools.ietf.org/wg/krb-wg/draft-ietf-cat-kerberos-pk-init/
-
(1996)
Public Key Cryptography for Initial Authentication in Kerberos
-
-
-
16
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks. SIAM J. Computing 17, 281-308 (1988)
-
(1988)
SIAM J. Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
17
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107-125 (1992)
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
18
-
-
84869635960
-
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS. vol. 2442, pp. 143-161. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe. G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0002885224
-
Prudent Engineering Practice for Cryptographic Protocols
-
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22, 6-15 (1996)
-
(1996)
IEEE Trans. Software Eng
, vol.22
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
23
-
-
84955619856
-
Typed MSR: Syntax and Examples
-
Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
-
Cervesato, I.: Typed MSR: Syntax and Examples. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2052
-
-
Cervesato, I.1
-
24
-
-
3042538605
-
Multiset Rewriting and the Complexity of Bounded Security Protocols
-
Durgin, N.A., Lincoln, P., Mitchell, J., Scedrov. A.: Multiset Rewriting and the Complexity of Bounded Security Protocols. J. Comp. Security 12, 247-311 (2004)
-
(2004)
J. Comp. Security
, vol.12
, pp. 247-311
-
-
Durgin, N.A.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
25
-
-
1442292329
-
A Composable Cryptographic Library with Nested Operations
-
ACM, New York 2003
-
Backes, M., Pfitzmann, B., Waidner, M.: A Composable Cryptographic Library with Nested Operations. In: Proc. CCS 2003, pp. 220-230. ACM, New York (2003)
-
(2003)
Proc. CCS
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
26
-
-
33947656534
-
Cryptographically sound theorem proving
-
Sprenger, C., Backes, M., Basin, D., Pfitzmann, B., Waidner, M.: Cryptographically sound theorem proving. In: Proc. CSFW 2006, pp. 153-166 (2006)
-
(2006)
Proc. CSFW 2006
, pp. 153-166
-
-
Sprenger, C.1
Backes, M.2
Basin, D.3
Pfitzmann, B.4
Waidner, M.5
|