-
1
-
-
85031620050
-
-
Montreal, August
-
M Abadi and M. R Tuttle, “A Semantics for a Logic of Authentication”, Proc. of the ACM 10th Symp on Principles of Distributed Computing, Montreal, August 1991, pp. 201-216.
-
(1991)
A Semantics for a Logic of Authentication, Proc. of the ACM 10Th Symp on Principles of Distributed Computing
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.R.2
-
2
-
-
0742311758
-
-
The Hebrew University of Jerusalem, Computer Science Department, Tech. Report CS91-13
-
Y. Amir, D. Dolev, S. Kramer, and D. Malm, “Transis: A Communication Subsystem for High Availability” The Hebrew University of Jerusalem, Computer Science Department, Tech. Report CS91-13, 1991.
-
(1991)
Transis:A Communication Subsystem for High Availability
-
-
Amir, Y.1
Dolev, D.2
Kramer, S.3
Malm, D.4
-
3
-
-
85016462400
-
Systematic Design of Two-Party Authentication Protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, “Systematic Design of Two-Party Authentication Protocols”, Lecture Notes in Computer Science 576 — Proceedings of Crypto 91. Springer-Verlag, 1992, pp. 44-61.
-
(1992)
Lecture Notes in Computer Science 576 — Proceedings of Crypto 91
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
kutten, P.4
Janson, S.5
Molva, R.6
Yung, M.7
-
5
-
-
0024880585
-
A Logic of Authentication
-
Published as ACM Operating Systems Review, December, 1989
-
M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication”, in Proceedings of the 12th ACM Symposium on Operating Systems Principles, Litchfield Park, Arizona, December, 1989, pp. 1-13. Published as ACM Operating Systems Review, Vol. 23, No. 5, December, 1989.
-
(1989)
Proceedings of the 12Th ACM Symposium on Operating Systems Principles, Litchfield Park, Arizona
, vol.23
, Issue.5
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0020190170
-
On the Security of Ping-Pong Protocols
-
D. Dolev, S. Even, and R. M. Karp, “On the Security of Ping-Pong Protocols”, Information and Control, 55, 1982, pp. 57-68.
-
(1982)
Information and Control
, vol.55
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.M.3
-
8
-
-
0003370741
-
A Security Risk of Depending on Synchronized Clocks
-
L. Gong, “A Security Risk of Depending on Synchronized Clocks”, Operating Systems Review, Vol. 26, No. 1, 1992, pp. 49-53.
-
(1992)
Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
9
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
Oakland, California, May
-
L. Gong, R. Needham, and R. Yahalom, “Reasoning about Belief in Cryptographic Protocols”, in Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, May, 1990, pp. 234-248.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
10
-
-
0017996760
-
Time, Clocs, and the Ordering of Events in a DistributedSystem
-
L. Lamport, “Time, Clocs, and the Ordering of Events in a Distributed System”, Comm, of the ACM, Vol. 21, No. 7, 1977, pp. 558-565.
-
(1977)
Comm, of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
11
-
-
0024749621
-
Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption
-
W. Lu and M. Sundareshan, “Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption”, IEEE Transactions on Communications, Vol. 37, No. 10, October, 1989, pp. 1014—1023.
-
(1989)
IEEE Transactions on Communications
, vol.37
, Issue.10
, pp. 1014-1023
-
-
Lu, W.1
Sundareshan, M.2
-
12
-
-
0342880800
-
Applying Formal Methods to the Analysis of Key Management Protocols
-
C. Meadows, “Applying Formal Methods to the Analysis of Key Management Protocols”, Journal of Computer Security, 1, 1992, pp. 5-53.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
14
-
-
0023295108
-
The Interrogator: Protocol Security Analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman, “The Interrogator: Protocol Security Analysis”, IEEE Trans, on Software Eng., SE-13, 1987, pp. 274-288.
-
(1987)
IEEE Trans, on Software Eng., SE-13
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
15
-
-
0018048246
-
-
Communications of the ACM
-
R. M. Needham and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers”, Communications of the ACM, Vol. 21, No. 12, December, 1978, pp. 993-999
-
(1978)
Using Encryption for Authentication in Large Networks of Computers
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
16
-
-
0002656687
-
Authenticatin Revisited
-
R. M. Needham and M. D. Schroeder, “Authenticatin Revisited”, Operating Systems Review, Vol. 21, No. 1, January, 1987, p. 7.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 7
-
-
Needham, R.M.1
Schroeder, M.D.2
-
17
-
-
0023247970
-
Efficient and Timely Mutual Authentication
-
D Otway and O Rees, “Efficient and Timely Mutual Authentication”, Operating Systems Review, Vol. 21, No. 1, January, 1987, pp. 1-10.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 1-10
-
-
Otway, D.1
Rees, O.2
-
18
-
-
0017930809
-
-
Communications of the ACM
-
R. L Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems”, Communications of the ACM, Vol. 21, No. 2, February, 1978, pp. 120-126.
-
(1978)
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
0006822710
-
The State Machine Approach: A Tutorial
-
Department of Computer Science, Cornell University, December
-
F B. Schneider, “The State Machine Approach: A Tutorial”, Technical Report 86800, Department of Computer Science, Cornell University, December 1986.
-
(1986)
Technical Report 86800
-
-
Schneider, F.B.1
-
20
-
-
0005343322
-
An Authentication Service for Open Network Systems
-
J. Steiner, C. Neuman, and J. I. Schiller, “Kerberos: An Authentication Service for Open Network Systems”, Proc. Winter Usenix Dallas, 1988.
-
(1988)
Kerberos
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.I.3
-
21
-
-
0026851843
-
-
Oakland, California
-
S. G. Stubblebine and V. D. Gligor, “On Message Integrity in Cryptographic Protocols”, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 1992, pp. 85-104.
-
(1992)
On Message Integrity in Cryptographic Protocols, in Proceedings of the IEEE Symposium on Security and Privacy
, pp. 85-104
-
-
Stubblebine, S.G.1
Gligor, V.D.2
-
22
-
-
85029507331
-
-
Computer Systems Research Institute, University of Toronto, Ontario, October
-
B. Thomson, E. S. Lee, P. I. P. Boulton, M. Stumm, and D. M. Lewis, “A Trusted Network Architecture”, Computer Systems Research Institute, University of Toronto, Ontario, October, 1988, pp. 69-93 197-203.
-
(1988)
A Trusted Network Architecture
-
-
Thomson, B.E.1
Boulton, P.I.P.2
Lee, S.3
Stumm, M.4
Lewis, D.M.5
-
23
-
-
0027266208
-
Trust Relations in Secure Systems — A Distributed Authentication Perspective
-
Oakland, California
-
R. Yahalom, B. Klein, and Th. Beth, “Trust Relations in Secure Systems — A Distributed Authentication Perspective”, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 1993, pp. 150-164.
-
(1993)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 150-164
-
-
klein, R.1
Yahalom, B.2
Beth, T.H.3
|