-
1
-
-
0025386404
-
A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including
-
Feb., All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
-
Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systejns, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
-
(1990)
ACM Transactions on Computer Systejns
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
0027617333
-
Systematic Design of a Family of Attack-Resistant Protocols
-
June
-
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic Design of a Family of Attack-Resistant Protocols. IEEE Journal on Selected Areas in Communication, 11(5):679-693, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communication
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
0025641513
-
A Logic of Communication in Hostile Environment
-
IEEE Computer Society Press, Los Alamitos, California, June
-
Pierre Bieber. A Logic of Communication in Hostile Environment. In Proc. Computer Security Foundations Workshop III, pages 14-22. IEEE Computer Society Press, Los Alamitos, California, June 1990.
-
(1990)
Proc. Computer Security Foundations Workshop III
, pp. 14-22
-
-
Bieber, P.1
-
4
-
-
0004381629
-
Using Logics to Detect Implementation-Dependent Flaws
-
IEEE Computer Society Press, Los Alamitos, California, December
-
Ulf Carlsen. Using Logics to Detect Implementation-Dependent Flaws. In Proceedings of the Ninth Annual Computer Security Applications Conference, pages 64-73. IEEE Computer Society Press, Los Alamitos, California, December 1993.
-
(1993)
Proceedings of the Ninth Annual Computer Security Applications Conference
, pp. 64-73
-
-
Carlsen, U.1
-
5
-
-
84976665942
-
Times-tamps in Key Distribution Protocols
-
August
-
D. E. Denning and G. M. Sacco. Times-tamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536, August 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
6
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Li Gong, Roger Needham, and Raphael Ya-halom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society Press, Los Alamitos, California, 1990.
-
(1990)
Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Ya-Halom, R.3
-
7
-
-
85055795738
-
Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Li Gong. Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols. In Proceedings of the Computer Security Foundations Workshop VI, pages 131-136. IEEE Computer Society Press, Los Alamitos, California, 1993.
-
(1993)
Proceedings of the Computer Security Foundations Workshop
, vol.6
, pp. 131-136
-
-
Gong, L.1
-
8
-
-
85068233104
-
On Belief Evolution in Authentication Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
Rajashekar Kailar and Virgil D. Gligor. On Belief Evolution in Authentication Protocols. In Proceedings of the Computer Security Foundations Workshop IV, pages 103-116. IEEE Computer Society Press, Los Alamitos, California, 1991.
-
(1991)
Proceedings of the Computer Security Foundations Workshop
, vol.4
, pp. 103-116
-
-
Kailar, R.1
Gligor, V.D.2
-
9
-
-
0023295108
-
The INTERROGATOR: Protocol Security Analysis
-
February
-
J.K. Millen, S.C. Clark, and S.B. Freedman. The INTERROGATOR: Protocol Security Analysis. IEEE Transactions on Software Engineering, SE-13(2):5-53, February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 5-53
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
10
-
-
0026152198
-
A System for the Specification and Analysis of Key Management Protocols
-
IEEE Computer Society Press, Los Alamitos, California
-
C. Meadows. A System for the Specification and Analysis of Key Management Protocols. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 182-195. IEEE Computer Society Press, Los Alamitos, California, 1991.
-
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy
, vol.1991
, pp. 182-195
-
-
Meadows, C.1
-
11
-
-
0342880800
-
Applying Formal Methods to the Analysis of a Key Management Protocol
-
C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
12
-
-
0024715186
-
Limitations of Challenge-Response Entity Authentication
-
August
-
C. Mitchell. Limitations of Challenge-Response Entity Authentication. Electronic Letters, 25(17):1195-1196, August 1989.
-
(1989)
Electronic Letters
, vol.25
, Issue.17
, pp. 1195-1196
-
-
Mitchell, C.1
-
13
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
Roger M. Needham and Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
16
-
-
0002796093
-
On Key Distribution Protocols for Repeated Authentication
-
October
-
Paul F. Syverson. On Key Distribution Protocols for Repeated Authentication. Operating Systems Review, 27(4):24-30, October 1993.
-
(1993)
Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.F.1
|