-
1
-
-
0025386404
-
A logic of authentication
-
Jan
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, Jan. 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
Apr
-
D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," ACM Operating Systems Review, vol. 24, no. 2, pp. 35-38, Apr. 1990.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
4
-
-
0036045935
-
BAN-like logic for cryptographic protocols analysis: A survey
-
Jan
-
Y. Q. Zhang, J. P. Wu, and X. Li, "BAN-like logic for cryptographic protocols analysis: a survey," Journal of Tsinghua University (Sci & Tech), vol. 42, no.1, pp. 96-99, Jan. 2002.
-
(2002)
Journal of Tsinghua University (Sci & Tech)
, vol.42
, Issue.1
, pp. 96-99
-
-
Zhang, Y.Q.1
Wu, J.P.2
Li, X.3
-
5
-
-
2342542981
-
Nonmonotonic cryptographic protocols,
-
Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI
-
A. D. Rubin, "Nonmonotonic cryptographic protocols," Ph.D. dissertation, Dept. Elec. Eng. and Computer Science, Univ. of Michigan, Ann Arbor, MI, 1994.
-
(1994)
-
-
Rubin, A.D.1
-
6
-
-
0031386327
-
Extending NCP for protocols using public keys
-
Mar
-
A. D. Rubin, "Extending NCP for protocols using public keys," Mobile Networks and Applications, vol. 2, no. 3, pp. 227-241, Mar. 1997.
-
(1997)
Mobile Networks and Applications
, vol.2
, Issue.3
, pp. 227-241
-
-
Rubin, A.D.1
-
7
-
-
33750085329
-
-
Z. M. Song, and S. H. Qing, Appling NCP logic to the analysis of SSL3.0, Information and Communication Security. Berlin: Springer-Verlag, pp. 155-166, 2001.
-
Z. M. Song, and S. H. Qing, "Appling NCP logic to the analysis of SSL3.0," Information and Communication Security. Berlin: Springer-Verlag, pp. 155-166, 2001.
-
-
-
-
8
-
-
58049105533
-
Analysis of PKM protocol of LMDS by NCP logic
-
Sep
-
S. X. Shao, J. Chen, and M. Wu, "Analysis of PKM protocol of LMDS by NCP logic, " Journal on Communications, vol. 25, no. 9, pp. 146-152, Sep. 2004.
-
(2004)
Journal on Communications
, vol.25
, Issue.9
, pp. 146-152
-
-
Shao, S.X.1
Chen, J.2
Wu, M.3
-
10
-
-
0024714097
-
Integrating security in a large distributed system
-
Aug
-
M. Satyanarayanan, "Integrating security in a large distributed system," ACM Transactions on Computer Systems, vol. 7, no. 3, pp. 247-280, Aug. 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
12
-
-
58049090978
-
-
Recommendation X.509-The directory: public-key and attribute certificate frameworks, ITU-T, 2005.
-
Recommendation X.509-The directory: public-key and attribute certificate frameworks, ITU-T, 2005.
-
-
-
-
13
-
-
16644392725
-
Security defects in the CCITT recommendation X. 509-The directory authentication framework
-
May
-
C. I'Anson, and C. Mitchell, "Security defects in the CCITT recommendation X. 509-The directory authentication framework," Computer Communication Review, vol. 20, no. 2, pp.30-34, May 1990.
-
(1990)
Computer Communication Review
, vol.20
, Issue.2
, pp. 30-34
-
-
I'Anson, C.1
Mitchell, C.2
-
14
-
-
12144253238
-
Analysis of CCITT X. 509 Based on Strand Space Model
-
Oct
-
R. Jang, J. H. Li, and L. Pan, "Analysis of CCITT X. 509 Based on Strand Space Model," Journal of Shanghai Jiaotong University, vol.38, no.10, pp. 169-173, Oct. 2004.
-
(2004)
Journal of Shanghai Jiaotong University
, vol.38
, Issue.10
, pp. 169-173
-
-
Jang, R.1
Li, J.H.2
Pan, L.3
-
15
-
-
0000874415
-
Limitations of the Kerberos Authentication. System
-
Oct
-
S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication. System," Computer Communication. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
-
(1990)
Computer Communication. Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
16
-
-
1442278656
-
Twenty Years Development of Security Protocols Research
-
Oct
-
S. H. Qing, "Twenty Years Development of Security Protocols Research," Journal of Software, vol. 14, no. 10, pp. 1740-1752, Oct. 2003.
-
(2003)
Journal of Software
, vol.14
, Issue.10
, pp. 1740-1752
-
-
Qing, S.H.1
|