On the Security of Public Key Protocols (Extended Abstract)
暂无分享,去创建一个
[1] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[5] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[6] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[7] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[8] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.