메뉴 건너뛰기




Volumn , Issue , 1993, Pages 131-136

Variations on the themes of message freshness and replay - Or the difficulty in devising formal methods to analyze cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85055795738     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.1993.246633     Document Type: Conference Paper
Times cited : (41)

References (26)
  • 1
    • 84976731140 scopus 로고
    • A key distribution protocol using event markers
    • [Bauer 83] August
    • [Bauer 83] R.K. Bauer, T.A. Berson, and R.J. Feiertag, "A Key Distribution Protocol Using Event Markers," ACM Transactions on Computer Systems, Vol.1, No.3, August, 1983, pp.249-255.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 249-255
    • Bauer, R.K.1    Berson, T.A.2    Feiertag, R.J.3
  • 3
    • 0025522255 scopus 로고
    • Hidden assumptions in cryptographic protocols
    • [Boyd 90] November
    • [Boyd 90] C.A. Boyd, "Hidden Assumptions in Cryptographic Protocols," Proceedings of IEE, Part E, Vol.137, No.6, November, 1990, pp.433-436.
    • (1990) Proceedings of IEE, Part E , vol.137 , Issue.6 , pp. 433-436
    • Boyd, C.A.1
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [Dolev 83] March
    • [Dolev 83] D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, Vol. IT-29, No.2, March, 1983, pp.198-208.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 6
    • 84976665942 scopus 로고
    • Times-tamps in key distribution protocols
    • [Denning 81] August
    • [Denning 81] D.E. Denning and G.M. Sacco, "Times-tamps in Key Distribution Protocols," Communications of the ACM, Vol.24, No.8, August, 1981, pp.533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [Dime 76] November
    • [Dime 76] W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No.6, November, 1976, pp.644-654.
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • [Gong 92] January
    • [Gong 92] L. Gong, "A Security Risk of Depending on Synchronized Clocks," ACM Operating Systems Review, Vol.26, No.1, January, 1992, pp.49-53.
    • (1992) ACM Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 11
    • 85008252795 scopus 로고
    • Timely authentication in distributed systems
    • [Lam 92] Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Springer-Verlag
    • [Lam 92] K.Y. Lam and T. Beth, "Timely Authentication in Distributed Systems," Proceedings of European Symposium on Research in Computer Security, Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Vol.648, Springer-Verlag, 1992, pp.293-303.
    • (1992) Proceedings of European Symposium on Research in Computer Security , vol.648 , pp. 293-303
    • Lam, K.Y.1    Beth, T.2
  • 12
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • [Lamport 78] July
    • [Lamport 78] L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, Vol.21, No.7, July, 1978, pp.558-565.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 13
    • 0024940229 scopus 로고
    • Reducing risks from poorly chosen keys
    • [Lomas 89] Litchfield Park, Arizona, December, Published as ACM Operating Systems Review
    • [Lomas 89] T.M.A. Lomas, L. Gong, J.H. Saltzer, and R.M. Needham, "Reducing Risks from Poorly Chosen Keys," in Proceedings of the 12th ACM Symposium on Operating System Principles, Litchfield Park, Arizona, December, 1989. Published as ACM Operating Systems Review, Vol.23, No.5, pp.14-18.
    • (1989) Proceedings of the 12th ACM Symposium on Operating System Principles , vol.23 , Issue.5 , pp. 14-18
    • Lomas, T.M.A.1    Gong, L.2    Saltzer, J.H.3    Needham, R.M.4
  • 15
    • 0000859448 scopus 로고
    • On the accuracy and stability of clocks synchronized by the network time protocol in the internet system
    • [Mills 90] January
    • [Mills 90] D.L. Mills, "On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System," ACM Computer Communication Review, Vol.20, No.1, January, 1990, pp.65-75.
    • (1990) ACM Computer Communication Review , vol.20 , Issue.1 , pp. 65-75
    • Mills, D.L.1
  • 16
    • 21144468597 scopus 로고
    • Kryptoknight authentication and key distribution system
    • [Molva92] Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Springer-Verlag
    • [Molva92] R. Molva, G. Tsudik, E. van Her-reweghen, and S. Zatti, "KryptoKnight Authentication and Key Distribution System," Proceedings of European Symposium on Research in Computer Security, Toulouse, France, November, 1992. Published as Lecture Notes in Computer Science, Vol.648, Springer-Verlag, 1992, pp.155-174.
    • (1992) Proceedings of European Symposium on Research in Computer Security , vol.648 , pp. 155-174
    • Molva, R.1    Tsudik, G.2    Van Her-Reweghen, E.3    Zatti, S.4
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • [Needham 78] December
    • [Needham 78] R.M. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Vol.21, No.12, December, 1978, pp.993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 85063456679 scopus 로고
    • [Needham 92] invited talk at the European Symposium on Research in Computer Security, Toulouse, France, November
    • [Needham 92] R.M. Needham, "Reasoning about Cryptographic Protocols," invited talk at the European Symposium on Research in Computer Security, Toulouse, France, November, 1992.
    • (1992) Reasoning about Cryptographic Protocols
    • Needham, R.M.1
  • 19
    • 84947924882 scopus 로고
    • [Reiter 93a] TR 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January
    • [Reiter 93a] M. Reiter, K. Birman, and R. van Renesse, "Fault-Tolerant Key Distribution," TR 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January, 1993.
    • (1993) Fault-Tolerant Key Distribution
    • Reiter, M.1    Birman, K.2    Van Renesse, R.3
  • 20
    • 0027148659 scopus 로고
    • Preventing denial and forgery of causal relationships in distributed systems
    • [Reiter 93b] to appear Oakland, California, May 24-26
    • [Reiter 93b] M. Reiter and L. Gong, "Preventing Denial and Forgery of Causal Relationships in Distributed Systems," to appear in Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, California, May 24-26, 1993.
    • (1993) Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy
    • Reiter, M.1    Gong, L.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • [Rivest 78] February
    • [Rivest 78] R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol.21, No.2, February, 1978, pp.120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 25
    • 85063462384 scopus 로고
    • [Tsang87] TR A5/87, Department of Information Systems and Computer Science, National University of Singapore, May
    • [Tsang87] W.W. Tsang and J.W. John, "A Neglected Aspect of Digital Signatures," TR A5/87, Department of Information Systems and Computer Science, National University of Singapore, May, 1987.
    • (1987) A Neglected Aspect of Digital Signatures
    • Tsang, W.W.1    John, J.W.2
  • 26
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • [Voydock 83] June
    • [Voydock 83] V.L. Voydock and S.T. Kent, "Security Mechanisms in High-Level Network Protocols," Computing Surveys, Vol.15, No.2, June, 1983, pp.135-171.
    • (1983) Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.