Introduction of Cryptographic Protocols
暂无分享,去创建一个
Kefei Chen | Ling Dong | Kefei Chen | Ling Dong | Kefei Chen
[1] Morrie Gasser,et al. DASS: Distributed Authentication Security Service , 1992, IFIP Congress.
[2] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[7] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[8] John C. Mitchell,et al. Protocol Composition Logic (PCL) , 2007, Computation, Meaning, and Logic.
[9] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[10] Qing Si. Design and Logical Analysis of Security Protocols , 2003 .
[11] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Simon S. Lam,et al. Authentification for Distributed Systems , 1992, Computer.
[13] Ansi Ieee,et al. Part11 : Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .
[14] Gavin Lowe. Towards a Completeness Result for Model Checking of Security Protocols (Extended Abstract) , 1998 .
[15] Bruno Blanchet,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2008, IEEE Transactions on Dependable and Secure Computing.
[16] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[17] Qing Si. Twenty Years Development of Security Protocols Research , 2003 .
[18] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[20] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[21] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[23] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[24] Ran Canetti,et al. Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols , 2006, TCC.