Identifying Potential Type Confusion in Authenticated Messages
暂无分享,去创建一个
[1] Jim Alves-Foss,et al. Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case , 1999 .
[2] Gavin Lowe,et al. How to prevent type flaw attacks on security protocols , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[3] Brian Weis,et al. The Group Domain of Interpretation , 2003, RFC.
[4] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[5] Catherine A. Meadows,et al. Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.
[6] Bruce Schneier,et al. Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.
[7] E. Snekkenes. Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.