메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 298-307

Security analysis of the SAML single sign-on browser/artifact profile

Author keywords

[No Author keywords available]

Indexed keywords

MARKUP LANGUAGES; SECURITY OF DATA; SPECIFICATIONS;

EID: 84944734046     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254334     Document Type: Conference Paper
Times cited : (99)

References (21)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 2
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Berlin, Springer-Verlag
    • R. Anderson and R. Needham. Robustness principles for public key protocols. In CRYPTO: Proceedings of Crypto, pages 236-247, Berlin, 1995. Springer-Verlag.
    • (1995) CRYPTO: Proceedings of Crypto , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 12
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • D. P. Kormann and A. D. Rubin. Risks of the passport single signon protocol. Computer Networks, 33:51-58, 2000.
    • (2000) Computer Networks , vol.33 , pp. 51-58
    • Kormann, D.P.1    Rubin, A.D.2
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer-Verlag, Berlin Germany
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 12744257762 scopus 로고    scopus 로고
    • Analyzing the needham-schroeder publickey protocol: A comparison of two approaches
    • LNCS, Springer-Verlag
    • C. Meadows. Analyzing the needham-schroeder publickey protocol: A comparison of two approaches. In ESORICS: European Symposium on Research in Computer Security. LNCS, Springer-Verlag, 1996.
    • (1996) ESORICS: European Symposium on Research in Computer Security
    • Meadows, C.1
  • 16
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):393-399, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 393-399
    • Needham, R.1    Schroeder, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.