Arbitrated multiparty protocol
暂无分享,去创建一个
[1] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[2] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[3] Laura Giordano,et al. Verifying Agents' Conformance with Multiparty Protocols , 2009, CLIMA.
[4] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[5] Ueli Maurer. Secure multi-party computation made simple , 2006, Discret. Appl. Math..
[6] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[7] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[8] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[9] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[10] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[11] Simon S. Lam,et al. A lesson on authentication protocol design , 1994, OPSR.
[12] Oded Goldreich,et al. Cryptography and cryptographic protocols , 2003, Distributed Computing.
[13] C. Boyd,et al. Methodical use of cryptographic transformations in authentication protocols , 1995 .
[14] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[15] Simon S. Lam,et al. Authentification for Distributed Systems , 1992, Computer.
[16] Adam D. Smith,et al. Efficient Two Party and Multi Party Computation Against Covert Adversaries , 2008, EUROCRYPT.
[17] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[20] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[21] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[22] Peter Honeyman,et al. Formal Methods for the Analysis of Authentication Protocols , 1993 .
[23] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[24] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[25] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[26] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[27] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[28] Ran Canetti,et al. Security and composition of cryptographic protocols: a tutorial (part I) , 2006, SIGA.