-
1
-
-
0002863367
-
Valuation of trust in open systems
-
D. Gollmann (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
-
T. Beth, M. Borcherding and B. Klein, Valuation of trust in open systems, Computer Security - ESORICS ‘94, D. Gollmann (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, vol. 875, pp. 3-18.
-
(1994)
Computer Security - ESORICS ‘94
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
2
-
-
0022614501
-
A global authentication service without global trust
-
A. Birell, B. Lampson, R. Needham and M. Schroeder, A global authentication service without global trust, Proc. IEEE Symposium on Research in Security and Privacy, 1986, pp. 223-230.
-
(1986)
Proc. IEEE Symposium on Research in Security and Privacy
, pp. 223-230
-
-
Birell, A.1
Lampson, B.2
Needham, R.3
Schroeder, M.4
-
3
-
-
0027612025
-
Security architectures using formal methods
-
C. Boyd, Security architectures using formal methods, IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, 1993, pp. 694-701.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 694-701
-
-
Boyd, C.1
-
4
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol. 8, no. 1, 1990, pp. 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0006599837
-
Partial belief and probabilistic reasoning in the analysis of secure protocols
-
IEEE Computer Society Press
-
E.A. Campbell, R. Safavi-Naini and P. A. Pleasants, Partial belief and probabilistic reasoning in the analysis of secure protocols, Proc. The Computer Security Foundations Workshop V, IEEE Computer Society Press, 1992, pp. 84-91.
-
(1992)
Proc. The Computer Security Foundations Workshop V
, pp. 84-91
-
-
Campbell, E.A.1
Safavi-Naini, R.2
Pleasants, P.A.3
-
6
-
-
0028514770
-
Towards a national public-key infrastructure
-
S. Chokhani, Towards a national public-key infrastructure, IEEE Communications Magazine, vol. 32, no. 9, 1994, pp. 70-74.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 70-74
-
-
Chokhani, S.1
-
7
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
0009149743
-
Uncertainty, belief, and probability
-
August
-
R. Fagin and J.Y. Halpern, Uncertainty, belief, and probability, Proc. of the Eleventh International Joint Conference on Artificial Intelligence, August 1989, vol. 2, pp. 1161-1167.
-
(1989)
Proc. Of the Eleventh International Joint Conference on Artificial Intelligence
, vol.2
, pp. 1161-1167
-
-
Fagin, R.1
Halpern, J.Y.2
-
9
-
-
0003421261
-
-
third ed., New York, NY: Wiley
-
W. Feller, An Introduction to Probability Theory and its Applications, third ed., vol. 1, New York, NY: Wiley, 1968.
-
(1968)
An Introduction to Probability Theory and Its Applications
, vol.1
-
-
Feller, W.1
-
10
-
-
0026900438
-
A logic for reasoning about security
-
J. Glasgow, G. MacEwen and P. Panangaden, A logic for reasoning about security, ACM Transactions on Computer Systems, vol. 10, no. 3, 1992, pp. 226-264.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
Macewen, G.2
Panangaden, P.3
-
12
-
-
84971607357
-
Probability logic
-
July
-
T. HalIperin, Probability logic, Notre Dame Journal of Formal Logic, vol. 25, no. 3, July 1984, pp. 198-212.
-
(1984)
Notre Dame Journal of Formal Logic
, vol.25
, Issue.3
, pp. 198-212
-
-
Haliperin, T.1
-
13
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows and E. Wobber, Authentication in distributed systems: theory and practice, Proc. 13th ACM Symp. on Operating Systems Principles, 1991, pp. 165-182.
-
(1991)
Proc. 13Th ACM Symp. On Operating Systems Principles
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
0342446297
-
A calculus for secure channel establishment in open networks
-
D. Gollmaun (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
-
U.M. Maurer and P.E. Schmid, A calculus for secure channel establishment in open networks Proc. 1994 European Symposium on Research in Computer Security (ESORICS’ 94), D. Gollmaun (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, vol. 875, pp. 175-192.
-
(1994)
Proc. 1994 European Symposium on Research in Computer Security (ESORICS’ 94)
, vol.875
, pp. 175-192
-
-
Maurer, U.M.1
Schmid, P.E.2
-
15
-
-
21144468597
-
KryptoKnight Authentication and Key Distribution System
-
Y. Deswarte, G. Eizenberg, J.-J. Quisquater (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
-
R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti, KryptoKnight Authentication and Key Distribution System, Proc. t992 European Symposium on Research in Computer Security (ESORICS 92), Y. Deswarte, G. Eizenberg, J.-J. Quisquater (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1992, vol. 648, pp. 155-174.
-
(1992)
Proc. T992 European Symposium on Research in Computer Security (ESORICS 92)
, vol.648
, pp. 155-174
-
-
Molva, R.1
Tsudik, G.2
Van Herreweghen, E.3
Zatti, S.4
-
17
-
-
0022659563
-
Probabilistic logic
-
N.J. Nilsson, Probabilistic logic, Artificial Intelligence, vol. 28, no. 1, 1986, pp. 71-86.
-
(1986)
Artificial Intelligence
, vol.28
, Issue.1
, pp. 71-86
-
-
Nilsson, N.J.1
-
18
-
-
0028439496
-
Designing Secure Communication Protocols from Trust Specifications
-
C.H. Papadimitriou, V. Rangan, M. Sideri, “Designing Secure Communication Protocols from Trust Specifications”, Algorithmica, 1994, pp. 485-499.
-
(1994)
Algorithmica
, pp. 485-499
-
-
Papadimitriou, C.H.1
Rangan, V.2
Sideri, M.3
-
19
-
-
0026854374
-
An axiomatic theory of trust in secure communication protocols
-
P.V. Rangan, An axiomatic theory of trust in secure communication protocols, Computers & Security, vol. 11, 1992, pp. 163-172.
-
(1992)
Computers & Security
, vol.11
, pp. 163-172
-
-
Rangan, P.V.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0003855464
-
-
2nd edition, John Wiley & Sons, Inc., New York
-
B. Schneier, Applied Cryptography, 2nd edition, John Wiley & Sons, Inc., New York, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
24
-
-
0027227136
-
-
A logical language for specifying cryptographic protocols requirements, Proc. IEEE Conf. on Research in Security and Privacy
-
P. Syverson and C. Meadows, A logical language for specifying cryptographic protocols requirements, Proc. IEEE Conf. on Research in Security and Privacy, 1993, pp. 165-180.
-
(1993)
, pp. 165-180
-
-
Syverson, P.1
Meadows, C.2
-
27
-
-
84949833571
-
-
Version 2.6, May 22
-
P. Zimmermann, PGP User’s Guide, vol. I and II, Version 2.6, May 22, 1994.
-
(1994)
PGP User’s Guide
, vol.1-2
-
-
Zimmermann, P.1
-
28
-
-
84949833572
-
Information technology - open systems interconnection - the directory
-
ISO/IEC International Standard 9594-8, Information technology - open systems interconnection - the directory, Part 8: Authentication framework, 1990.
-
(1990)
Part 8: Authentication Framework
-
-
-
29
-
-
84949833573
-
-
Internet Request for Comments (RFC)
-
Privacy enhanced mail (PEM), Internet Request for Comments (RFC) 1421-1424.
-
-
-
|