-
1
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - CRYPTO '93
-
Bellare, M. and Rogaway, P. (1993) 'Entity authentication and key distribution', in D.R. Stinson (Ed.), Advances in Cryptology-CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 22-26 August 1993, Proceedings, Vol.773 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.232-249. (Pubitemid 24771256)
-
(1994)
Lecture Notes in Computer Science
, Issue.773
, pp. 232
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
15944418684
-
-
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, USA, ACM Press
-
Bellare, M. and Rogaway, P. (1995) 'Provably secure session key distribution: the three party case', Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, USA, ACM Press, pp.57-66.
-
(1995)
Provably Secure Session Key Distribution: The Three Party Case
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
35048826242
-
The EAX mode of operation
-
in B. Roy and W. Meier (Eds.) Delhi, India, 5-7 February 2004, Revised Papers 3017 of Lecture Notes in Computer Science. Berlin: Springer-Verlag
-
Bellare, M., Rogaway, P. and Wagner, D. (2004) 'The EAX mode of operation', in B. Roy and W. Meier (Eds.), Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, 5-7 February 2004, Revised Papers, Vol.3017 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.389-407.
-
(2004)
Fast Software Encryption, 11th International Workshop, FSE 2004
, pp. 389-407
-
-
Bellare, M.1
Rogaway, P.2
Wagner, D.3
-
6
-
-
77950665222
-
Attacks on an ISO/IEC 11770-2 key establishment protocol
-
Cheng, Z. and Comley, R. (2006) 'Attacks on an ISO/IEC 11770-2 key establishment protocol', Int. J. Network Security, Vol.3, pp.290-295.
-
(2006)
Int. J. Network Security
, vol.3
, pp. 290-295
-
-
Cheng, Z.1
Comley, R.2
-
7
-
-
34548805571
-
Attacking the IPsec standards in encryption-only configurations
-
20-23 May 2007, Oakland, California, USA, IEEE Computer Society Press, Los Alamitos, California
-
Degabriele, J.P. and Paterson, K.G. (2007) 'Attacking the IPsec standards in encryption-only configurations', Proceedings: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, IEEE Computer Society Press, Los Alamitos, California, pp.335-349.
-
(2007)
Proceedings: 2007 IEEE Symposium on Security and Privacy (S&P 2007)
, pp. 335-349
-
-
Degabriele, J.P.1
Paterson, K.G.2
-
20
-
-
0024715186
-
Limitations of challenge-response entity authentication'
-
Mitchell, C.J. (1989) 'Limitations of challenge-response entity authentication', Electronics Letters, Vol.25, pp.1195-1196.
-
(1989)
Electronics Letters
, vol.25
, pp. 1195-1196
-
-
Mitchell, C.J.1
-
21
-
-
19144365899
-
Standardising authentication protocols based on public key techniques'
-
Mitchell, C.J. and Thomas, A. (1993) 'Standardising authentication protocols based on public key techniques', Journal of Computer Security, Vol.2, pp.23-36.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 23-36
-
-
Mitchell, C.J.1
Thomas, A.2
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers'
-
Needham, R.M. and Schroeder, M.D. (1978) 'Using encryption for authentication in large networks of computers', Communications of the ACM, Vol.21, pp.993-999.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
25
-
-
0028514601
-
Kerberos: An authentication service for computer networks'
-
September 1994
-
Neuman, B.C. and Ts'o, T. (1994) 'Kerberos: an authentication service for computer networks', IEEE Communications Magazine, Vol.32, No.9, pp.33-38, September 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'O, T.2
|