메뉴 건너뛰기




Volumn 96, Issue , 2002, Pages 588-600

A bound on attacks on authentication protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84891081669     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35608-2_48     Document Type: Article
Times cited : (9)

References (14)
  • 5
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-564, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-564
    • Lamport, L.1
  • 6
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • of Lecture Notes in Computer Science, Springer
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. Workshop on Tools and Algorithms for The Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Proc. Workshop On Tools and Algorithms For the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 7
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Gavin Lowe. Towards a completeness result for model checking of security protocols. The Journal of Computer Security, 7(2/3):89-146, 1999.
    • (1999) The Journal of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 8
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • January
    • Dave Otway and Owen Rees. Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, January 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 9
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. The Journal of Computer Security, 6(l/2):85-128, 1996.
    • (1996) The Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 10
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. The Journal of Computer Security, 7(2/3), 1999.
    • (1999) The Journal of Computer Security , vol.7 , Issue.2-3
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 11
    • 0004021264 scopus 로고    scopus 로고
    • Technical Report, Computer Science Dept., Indiana University, July, Revised April 2001, Also available at
    • Scott D. Stoller. A bound on attacks on authentication protocols. Technical Report 526, Computer Science Dept., Indiana University, July 1999. Revised April 2001. Also available at www.cs.sunysb.edu/~stoller/TR526.html.
    • (1999) A Bound On Attacks On Authentication Protocols , vol.526
    • Stoller, S.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.