-
1
-
-
84976731140
-
A key distribution protocol using event markers
-
[Bauer 83] August
-
[Bauer 83] R.K. Bauer, T.A. Berson, and R.J. Feiertag, "A Key Distribution Protocol Using Event Markers," ACM Transactions on Computer Systems, Vol.1, No.3, August, 1983, pp.249-255.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 249-255
-
-
Bauer, R.K.1
Berson, T.A.2
Feiertag, R.J.3
-
2
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
[Bird 93] to appear
-
[Bird 93] B. Bird, I. Gopal, A. Herzberg, P. Jan-son, S. Kutten, R. Molva, and M. Yung, "Systematic Design of a Family of Attack-Resistant Authentication Protocols," to appear in IEEE Journal on Selected Areas in Communications, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
-
-
Bird, B.1
Gopal, I.2
Herzberg, A.3
Jan-Son, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
0025522255
-
Hidden assumptions in cryptographic protocols
-
[Boyd 90] November
-
[Boyd 90] C.A. Boyd, "Hidden Assumptions in Cryptographic Protocols," Proceedings of IEE, Part E, Vol.137, No.6, November, 1990, pp.433-436.
-
(1990)
Proceedings of IEE, Part E
, vol.137
, Issue.6
, pp. 433-436
-
-
Boyd, C.A.1
-
4
-
-
0025386404
-
A logic for authentication
-
[Burrows 90] February
-
[Burrows 90] M. Burrows, M. Abadi, R.M. Needham, "A Logic for Authentication," ACM Transactions on Computer Systems, Vol.8, No.1, February, 1990, pp.18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
5
-
-
0020720357
-
On the security of public key protocols
-
[Dolev 83] March
-
[Dolev 83] D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, Vol. IT-29, No.2, March, 1983, pp.198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
6
-
-
84976665942
-
Times-tamps in key distribution protocols
-
[Denning 81] August
-
[Denning 81] D.E. Denning and G.M. Sacco, "Times-tamps in Key Distribution Protocols," Communications of the ACM, Vol.24, No.8, August, 1981, pp.533-536.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
7
-
-
0017018484
-
New directions in cryptography
-
[Dime 76] November
-
[Dime 76] W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No.6, November, 1976, pp.644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
[Gong 90b] Oakland, California, May
-
[Gong 90b] L. Gong, R. Needham, and R. Yahalom, "Reasoning about Belief in Cryptographic Protocols," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May, 1990, pp.234-248.
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
10
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
[Gong 92] January
-
[Gong 92] L. Gong, "A Security Risk of Depending on Synchronized Clocks," ACM Operating Systems Review, Vol.26, No.1, January, 1992, pp.49-53.
-
(1992)
ACM Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
11
-
-
85008252795
-
Timely authentication in distributed systems
-
[Lam 92] Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Springer-Verlag
-
[Lam 92] K.Y. Lam and T. Beth, "Timely Authentication in Distributed Systems," Proceedings of European Symposium on Research in Computer Security, Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Vol.648, Springer-Verlag, 1992, pp.293-303.
-
(1992)
Proceedings of European Symposium on Research in Computer Security
, vol.648
, pp. 293-303
-
-
Lam, K.Y.1
Beth, T.2
-
12
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
[Lamport 78] July
-
[Lamport 78] L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, Vol.21, No.7, July, 1978, pp.558-565.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
13
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
[Lomas 89] Litchfield Park, Arizona, December, Published as ACM Operating Systems Review
-
[Lomas 89] T.M.A. Lomas, L. Gong, J.H. Saltzer, and R.M. Needham, "Reducing Risks from Poorly Chosen Keys," in Proceedings of the 12th ACM Symposium on Operating System Principles, Litchfield Park, Arizona, December, 1989. Published as ACM Operating Systems Review, Vol.23, No.5, pp.14-18.
-
(1989)
Proceedings of the 12th ACM Symposium on Operating System Principles
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.M.A.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
14
-
-
0025547324
-
On replay detection in distributed systems
-
[Luan 90] Paris, May
-
[Luan 90] S.W. Luan and V.D Gligor, "On Replay Detection in Distributed Systems," in Proceedings of the 10th International Conference on Distributed Computing Systems, Paris, May, 1990, pp. 188-195.
-
(1990)
Proceedings of the 10th International Conference on Distributed Computing Systems
, pp. 188-195
-
-
Luan, S.W.1
Gligor, V.D.2
-
15
-
-
0000859448
-
On the accuracy and stability of clocks synchronized by the network time protocol in the internet system
-
[Mills 90] January
-
[Mills 90] D.L. Mills, "On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System," ACM Computer Communication Review, Vol.20, No.1, January, 1990, pp.65-75.
-
(1990)
ACM Computer Communication Review
, vol.20
, Issue.1
, pp. 65-75
-
-
Mills, D.L.1
-
16
-
-
21144468597
-
Kryptoknight authentication and key distribution system
-
[Molva92] Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Springer-Verlag
-
[Molva92] R. Molva, G. Tsudik, E. van Her-reweghen, and S. Zatti, "KryptoKnight Authentication and Key Distribution System," Proceedings of European Symposium on Research in Computer Security, Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Vol.648, Springer-Verlag, 1992, pp.155-174.
-
(1992)
Proceedings of European Symposium on Research in Computer Security
, vol.648
, pp. 155-174
-
-
Molva, R.1
Tsudik, G.2
Van Her-Reweghen, E.3
Zatti, S.4
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
[Needham 78] December
-
[Needham 78] R.M. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Vol.21, No.12, December, 1978, pp.993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
18
-
-
85063456679
-
-
[Needham 92] invited talk at the European Symposium on Research in Computer Security, Toulouse, France, November
-
[Needham 92] R.M. Needham, "Reasoning about Cryptographic Protocols," invited talk at the European Symposium on Research in Computer Security, Toulouse, France, November, 1992.
-
(1992)
Reasoning about Cryptographic Protocols
-
-
Needham, R.M.1
-
19
-
-
84947924882
-
-
[Reiter 93a] TR 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January
-
[Reiter 93a] M. Reiter, K. Birman, and R. van Renesse, "Fault-Tolerant Key Distribution," TR 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January, 1993.
-
(1993)
Fault-Tolerant Key Distribution
-
-
Reiter, M.1
Birman, K.2
Van Renesse, R.3
-
20
-
-
0027148659
-
Preventing denial and forgery of causal relationships in distributed systems
-
[Reiter 93b] to appear Oakland, California, May 24-26
-
[Reiter 93b] M. Reiter and L. Gong, "Preventing Denial and Forgery of Causal Relationships in Distributed Systems," to appear in Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, California, May 24-26, 1993.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy
-
-
Reiter, M.1
Gong, L.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[Rivest 78] February
-
[Rivest 78] R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol.21, No.2, February, 1978, pp.120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
[Steiner 88] February
-
[Steiner 88] J.G. Steiner, C. Neuman, and J.I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," in Proceedings of the USENIX Winter Conference, February, 1988, pp.191-202.
-
(1988)
Proceedings of the USENIX Winter Conference
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
23
-
-
0026851843
-
On message integrity in cryptographic protocols
-
[Stubblebine 92] Oakland, California, May
-
[Stubblebine 92] S. Stubblebine and V.D. Gligor, "On Message Integrity in Cryptographic Protocols," in Proceedings of the 1992 IEEE Symposium on Security and Privacy, Oakland, California, May, 1992, pp.85-104.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 85-104
-
-
Stubblebine, S.1
Gligor, V.D.2
-
24
-
-
0001857259
-
An overview of clock synchronization
-
[Simons 90] in B. Simons and A. Spector (Eds.), Springer-Verlag
-
[Simons 90] B. Simons, J.L. Welch, and N. Lynch, "An Overview of Clock Synchronization," in B. Simons and A. Spector (Eds.), Fault-Tolerant Distributed Computing, published as Lecture Notes in Computer Science, No.448, Springer-Verlag, 1990.
-
(1990)
Fault-Tolerant Distributed Computing, Published As Lecture Notes in Computer Science
, Issue.448
-
-
Simons, B.1
Welch, J.L.2
Lynch, N.3
-
25
-
-
85063462384
-
-
[Tsang87] TR A5/87, Department of Information Systems and Computer Science, National University of Singapore, May
-
[Tsang87] W.W. Tsang and J.W. John, "A Neglected Aspect of Digital Signatures," TR A5/87, Department of Information Systems and Computer Science, National University of Singapore, May, 1987.
-
(1987)
A Neglected Aspect of Digital Signatures
-
-
Tsang, W.W.1
John, J.W.2
-
26
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
[Voydock 83] June
-
[Voydock 83] V.L. Voydock and S.T. Kent, "Security Mechanisms in High-Level Network Protocols," Computing Surveys, Vol.15, No.2, June, 1983, pp.135-171.
-
(1983)
Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
|