메뉴 건너뛰기




Volumn 1550, Issue , 1998, Pages 213-219

Insider fraud

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957808033     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49135-X_29     Document Type: Conference Paper
Times cited : (6)

References (9)
  • 1
    • 84957807464 scopus 로고
    • What do we mean by entity authentication?
    • DEC Systems Research Center, Report 39, revised February 22
    • Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. DEC Systems Research Center, Report 39, revised February 22 1990.
    • (1990) A logic of authentication
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 4
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer LNCS 1055
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, pages 147-166. Springer LNCS 1055, 1996.
    • (1996) Proceedings of TACAS , pp. 147-166
    • Lowe, G.1
  • 6
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Roger M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. CACM, 21:993-999, 1978.
    • (1978) CACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 7
    • 84957813314 scopus 로고    scopus 로고
    • Intensional specifications of security protocols
    • Technical Report 443, Computer Laboratory, University of Cambridge, February
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Technical Report 443, Computer Laboratory, University of Cambridge, February 1998.
    • (1998) The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.