-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. M. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22 January
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.M.2
-
6
-
-
0025386404
-
A logic for authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic for authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
IEEE Computer Society Press
-
R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proceedings of the 14th IEEE Symposium on Security and Privacy, pages 236-250. IEEE Computer Society Press, 1995.
-
(1995)
Proceedings of the 14Th IEEE Symposium on Security and Privacy
, pp. 236-250
-
-
Kailar, R.1
-
10
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(18-30):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.18-30
, pp. 53-84
-
-
Lowe, G.1
-
11
-
-
84949935723
-
-
SET Secure Electronic Transaction Specification: Business DescriptionMay
-
Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
-
(1997)
-
-
-
12
-
-
84949990911
-
-
SET Secure Electronic Transaction Specification: Programmer’s Guide, May
-
Mastercard & VISA. SET Secure Electronic Transaction Specification: Programmer’s Guide, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
-
(1997)
-
-
-
13
-
-
84949967765
-
-
. SET Secure Electronic Transaction Specification: Protocol Definition, May
-
Mastercard & VISA. SET Secure Electronic Transaction Specification: Protocol Definition, May 1997. Available electronically at http://www.setco.org/setspecifications.html.
-
(1997)
-
-
-
15
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.2
-
17
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
19
-
-
84949969847
-
-
RSA Security-Available electronically at , 19: Extended-Certificate Syntax Standard
-
RSA Laboratories, RSA Security-Available electronically at http://www.rsasecurity.com/rsalabs/pkcs. 19: Extended-Certificate Syntax Standard, 1993.
-
(1993)
-
-
-
20
-
-
84949981934
-
-
RSA Security-Available electronically at , 20: Cryptographic Message Syntax Standard
-
RSA Laboratories, RSA Security-Available electronically at http://www.rsasecurity.com/rsalabs/pkcs. 20: Cryptographic Message Syntax Standard, 1993.
-
(1993)
-
-
-
21
-
-
0001937830
-
A formal language for cryptographic protocol requirement
-
P. Syverson and C. Meadows. A formal language for cryptographic protocol requirement. Designs, Codes and Cryptography, 7(xxx):27-59, 1996.
-
(1996)
Designs, Codes and Cryptography
, vol.7
, Issue.30
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
|