메뉴 건너뛰기




Volumn 2, Issue 2-3, 1993, Pages 191-209

Optimality of asynchronous two-party secure data-exchange protocols

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84974746841     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-1993-22-307     Document Type: Article
Times cited : (4)

References (23)
  • 7
    • 0020190170 scopus 로고
    • On the Security of Ping-Pong Protocols
    • D. Dolev, S. Even, and R. M. Karp, “On the Security of Ping-Pong Protocols”, Information and Control, 55, 1982, pp. 57-68.
    • (1982) Information and Control , vol.55 , pp. 57-68
    • Dolev, D.1    Even, S.2    Karp, R.M.3
  • 8
    • 0003370741 scopus 로고
    • A Security Risk of Depending on Synchronized Clocks
    • L. Gong, “A Security Risk of Depending on Synchronized Clocks”, Operating Systems Review, Vol. 26, No. 1, 1992, pp. 49-53.
    • (1992) Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 10
    • 0017996760 scopus 로고
    • Time, Clocs, and the Ordering of Events in a DistributedSystem
    • L. Lamport, “Time, Clocs, and the Ordering of Events in a Distributed System”, Comm, of the ACM, Vol. 21, No. 7, 1977, pp. 558-565.
    • (1977) Comm, of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 11
    • 0024749621 scopus 로고
    • Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption
    • W. Lu and M. Sundareshan, “Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption”, IEEE Transactions on Communications, Vol. 37, No. 10, October, 1989, pp. 1014—1023.
    • (1989) IEEE Transactions on Communications , vol.37 , Issue.10 , pp. 1014-1023
    • Lu, W.1    Sundareshan, M.2
  • 12
    • 0342880800 scopus 로고
    • Applying Formal Methods to the Analysis of Key Management Protocols
    • C. Meadows, “Applying Formal Methods to the Analysis of Key Management Protocols”, Journal of Computer Security, 1, 1992, pp. 5-53.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 17
    • 0023247970 scopus 로고
    • Efficient and Timely Mutual Authentication
    • D Otway and O Rees, “Efficient and Timely Mutual Authentication”, Operating Systems Review, Vol. 21, No. 1, January, 1987, pp. 1-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 1-10
    • Otway, D.1    Rees, O.2
  • 19
    • 0006822710 scopus 로고
    • The State Machine Approach: A Tutorial
    • Department of Computer Science, Cornell University, December
    • F B. Schneider, “The State Machine Approach: A Tutorial”, Technical Report 86800, Department of Computer Science, Cornell University, December 1986.
    • (1986) Technical Report 86800
    • Schneider, F.B.1
  • 20
    • 0005343322 scopus 로고
    • An Authentication Service for Open Network Systems
    • J. Steiner, C. Neuman, and J. I. Schiller, “Kerberos: An Authentication Service for Open Network Systems”, Proc. Winter Usenix Dallas, 1988.
    • (1988) Kerberos
    • Steiner, J.1    Neuman, C.2    Schiller, J.I.3
  • 23
    • 0027266208 scopus 로고
    • Trust Relations in Secure Systems — A Distributed Authentication Perspective
    • Oakland, California
    • R. Yahalom, B. Klein, and Th. Beth, “Trust Relations in Secure Systems — A Distributed Authentication Perspective”, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 1993, pp. 150-164.
    • (1993) Proceedings of the IEEE Symposium on Security and Privacy , pp. 150-164
    • klein, R.1    Yahalom, B.2    Beth, T.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.