메뉴 건너뛰기




Volumn , Issue , 1995, Pages 187-191

A taxonomy of replay attacks [cryptographic protocols]

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85055796408     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.1994.315935     Document Type: Conference Paper
Times cited : (147)

References (16)
  • 1
    • 0025386404 scopus 로고
    • A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including
    • Feb., All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990
    • Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. Research Report 39, Digital Systems Research Center, February 1989. Parts and versions of this material have been presented in many places including ACM Transactions on Computer Systejns, 8(1): 18-36, Feb. 1990. All references herein are to the SRC Research Report 39 as revised Feb. 22, 1990.
    • (1990) ACM Transactions on Computer Systejns , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 0025641513 scopus 로고
    • A Logic of Communication in Hostile Environment
    • IEEE Computer Society Press, Los Alamitos, California, June
    • Pierre Bieber. A Logic of Communication in Hostile Environment. In Proc. Computer Security Foundations Workshop III, pages 14-22. IEEE Computer Society Press, Los Alamitos, California, June 1990.
    • (1990) Proc. Computer Security Foundations Workshop III , pp. 14-22
    • Bieber, P.1
  • 4
    • 0004381629 scopus 로고
    • Using Logics to Detect Implementation-Dependent Flaws
    • IEEE Computer Society Press, Los Alamitos, California, December
    • Ulf Carlsen. Using Logics to Detect Implementation-Dependent Flaws. In Proceedings of the Ninth Annual Computer Security Applications Conference, pages 64-73. IEEE Computer Society Press, Los Alamitos, California, December 1993.
    • (1993) Proceedings of the Ninth Annual Computer Security Applications Conference , pp. 64-73
    • Carlsen, U.1
  • 5
    • 84976665942 scopus 로고
    • Times-tamps in Key Distribution Protocols
    • August
    • D. E. Denning and G. M. Sacco. Times-tamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536, August 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 85055795738 scopus 로고
    • Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Li Gong. Variations on the Themes of Message Freshness and Replay or, the Difficulty of Devising Formal Methods to Analyze Cryptographic Protocols. In Proceedings of the Computer Security Foundations Workshop VI, pages 131-136. IEEE Computer Society Press, Los Alamitos, California, 1993.
    • (1993) Proceedings of the Computer Security Foundations Workshop , vol.6 , pp. 131-136
    • Gong, L.1
  • 8
    • 85068233104 scopus 로고
    • On Belief Evolution in Authentication Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • Rajashekar Kailar and Virgil D. Gligor. On Belief Evolution in Authentication Protocols. In Proceedings of the Computer Security Foundations Workshop IV, pages 103-116. IEEE Computer Society Press, Los Alamitos, California, 1991.
    • (1991) Proceedings of the Computer Security Foundations Workshop , vol.4 , pp. 103-116
    • Kailar, R.1    Gligor, V.D.2
  • 10
    • 0026152198 scopus 로고    scopus 로고
    • A System for the Specification and Analysis of Key Management Protocols
    • IEEE Computer Society Press, Los Alamitos, California
    • C. Meadows. A System for the Specification and Analysis of Key Management Protocols. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 182-195. IEEE Computer Society Press, Los Alamitos, California, 1991.
    • Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy , vol.1991 , pp. 182-195
    • Meadows, C.1
  • 11
    • 0342880800 scopus 로고
    • Applying Formal Methods to the Analysis of a Key Management Protocol
    • C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5-53, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 12
    • 0024715186 scopus 로고
    • Limitations of Challenge-Response Entity Authentication
    • August
    • C. Mitchell. Limitations of Challenge-Response Entity Authentication. Electronic Letters, 25(17):1195-1196, August 1989.
    • (1989) Electronic Letters , vol.25 , Issue.17 , pp. 1195-1196
    • Mitchell, C.1
  • 13
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December
    • Roger M. Needham and Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 16
    • 0002796093 scopus 로고
    • On Key Distribution Protocols for Repeated Authentication
    • October
    • Paul F. Syverson. On Key Distribution Protocols for Repeated Authentication. Operating Systems Review, 27(4):24-30, October 1993.
    • (1993) Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.