메뉴 건너뛰기




Volumn 3, Issue 1, 2010, Pages 82-94

Parsing ambiguities in authentication and key establishment protocols

Author keywords

Attack; Authentication; Key establishment; Security protocol.

Indexed keywords

COMPUTER NETWORKS; ELECTRONIC CRIME COUNTERMEASURES;

EID: 77950669596     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2010.032333     Document Type: Article
Times cited : (6)

References (25)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - CRYPTO '93
    • Bellare, M. and Rogaway, P. (1993) 'Entity authentication and key distribution', in D.R. Stinson (Ed.), Advances in Cryptology-CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 22-26 August 1993, Proceedings, Vol.773 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.232-249. (Pubitemid 24771256)
    • (1994) Lecture Notes in Computer Science , Issue.773 , pp. 232
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 15944418684 scopus 로고
    • Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, USA, ACM Press
    • Bellare, M. and Rogaway, P. (1995) 'Provably secure session key distribution: the three party case', Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, USA, ACM Press, pp.57-66.
    • (1995) Provably Secure Session Key Distribution: The Three Party Case , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 35048826242 scopus 로고    scopus 로고
    • The EAX mode of operation
    • in B. Roy and W. Meier (Eds.) Delhi, India, 5-7 February 2004, Revised Papers 3017 of Lecture Notes in Computer Science. Berlin: Springer-Verlag
    • Bellare, M., Rogaway, P. and Wagner, D. (2004) 'The EAX mode of operation', in B. Roy and W. Meier (Eds.), Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, 5-7 February 2004, Revised Papers, Vol.3017 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.389-407.
    • (2004) Fast Software Encryption, 11th International Workshop, FSE 2004 , pp. 389-407
    • Bellare, M.1    Rogaway, P.2    Wagner, D.3
  • 6
    • 77950665222 scopus 로고    scopus 로고
    • Attacks on an ISO/IEC 11770-2 key establishment protocol
    • Cheng, Z. and Comley, R. (2006) 'Attacks on an ISO/IEC 11770-2 key establishment protocol', Int. J. Network Security, Vol.3, pp.290-295.
    • (2006) Int. J. Network Security , vol.3 , pp. 290-295
    • Cheng, Z.1    Comley, R.2
  • 7
    • 34548805571 scopus 로고    scopus 로고
    • Attacking the IPsec standards in encryption-only configurations
    • 20-23 May 2007, Oakland, California, USA, IEEE Computer Society Press, Los Alamitos, California
    • Degabriele, J.P. and Paterson, K.G. (2007) 'Attacking the IPsec standards in encryption-only configurations', Proceedings: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, IEEE Computer Society Press, Los Alamitos, California, pp.335-349.
    • (2007) Proceedings: 2007 IEEE Symposium on Security and Privacy (S&P 2007) , pp. 335-349
    • Degabriele, J.P.1    Paterson, K.G.2
  • 20
    • 0024715186 scopus 로고
    • Limitations of challenge-response entity authentication'
    • Mitchell, C.J. (1989) 'Limitations of challenge-response entity authentication', Electronics Letters, Vol.25, pp.1195-1196.
    • (1989) Electronics Letters , vol.25 , pp. 1195-1196
    • Mitchell, C.J.1
  • 21
    • 19144365899 scopus 로고
    • Standardising authentication protocols based on public key techniques'
    • Mitchell, C.J. and Thomas, A. (1993) 'Standardising authentication protocols based on public key techniques', Journal of Computer Security, Vol.2, pp.23-36.
    • (1993) Journal of Computer Security , vol.2 , pp. 23-36
    • Mitchell, C.J.1    Thomas, A.2
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers'
    • Needham, R.M. and Schroeder, M.D. (1978) 'Using encryption for authentication in large networks of computers', Communications of the ACM, Vol.21, pp.993-999.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 25
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks'
    • September 1994
    • Neuman, B.C. and Ts'o, T. (1994) 'Kerberos: an authentication service for computer networks', IEEE Communications Magazine, Vol.32, No.9, pp.33-38, September 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'O, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.