Authentication: A Practical Study in Belief and Action
暂无分享,去创建一个
[1] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[2] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[3] Joseph Y. Halpern,et al. The complexity of reasoning about knowledge and time , 1986, STOC '86.
[4] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[5] Joseph Y. Halpern,et al. Knowledge and common knowledge in a distributed environment , 1984, JACM.
[6] Roger M. Needham,et al. Authentication revisited , 1987, OPSR.
[7] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[8] Joseph Y. Halpern,et al. A little knowledge goes a long way: knowledge-based derivations and correctness proofs for a family of protocols , 1992, JACM.
[9] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[10] Van Nguyen,et al. Do We Really Know What Knowledge Is? , 1986, XP7.52 Workshop on Database Theory.