A survey of authentication protocol literature: Version 1.0
暂无分享,去创建一个
[1] Paul C. Kocher. Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .
[2] Dieter Gollmann. What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Ross J. Anderson,et al. On the Reliability of Electronic Payment Systems , 1996, IEEE Trans. Software Eng..
[5] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[6] Gavin Lowe,et al. Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[7] A. W. Roscoe. Intensional specifications of security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[8] Colin Boyd. A class of flexible and efficient key management protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[9] John A. Clark,et al. Attacking Authentication Protocols , 1996 .
[10] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[11] John A. Clark,et al. On the Security of Recent Protocols , 1995, Inf. Process. Lett..
[12] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[13] Randy Chow,et al. An efficient and secure authentication protocol using uncertified keys , 1995, OPSR.
[14] Tzonelih Hwang,et al. On the Security of SPLICE/AS - The Authentication System in WIDE Internet , 1995, Inf. Process. Lett..
[15] Tzonelih Hwang,et al. Two Attacks on Neuman-Stubblebine Authentication Protocols , 1995, Inf. Process. Lett..
[16] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[17] Jennifer Seberry,et al. Beacon Based Authentication , 1994, ESORICS.
[18] Ross J. Anderson. Liability and Computer Security: Nine Principles , 1994, ESORICS.
[19] Gene Tsudik,et al. Robust and Secure Password and Key Change Method , 1994, ESORICS.
[20] Colin Boyd,et al. On Strengthening Authentication Protocols to Foil Cryptanalysis , 1994, ESORICS.
[21] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[22] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[23] Simon S. Lam,et al. A lesson on authentication protocol design , 1994, OPSR.
[24] Ulf Carlsen. Optimal privacy and authentication on a portable communications system , 1994, OPSR.
[25] Volker Kessler,et al. AUTLOG-an advanced logic of authentication , 1994, Proceedings The Computer Security Foundations Workshop VII.
[26] Colin Boyd,et al. Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.
[27] Ulf Carlsen. Generating formal cryptographic protocol specifications , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[28] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[30] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[31] Nora Cuppens-Boulahia,et al. Formal Development of Authentication Protocols , 1994, Refine.
[32] Paul C. van Oorschot,et al. An Alternate Explanation of two BAN-logic "failures" , 1994, EUROCRYPT.
[33] Colin Boyd,et al. On a Limitation of BAN Logic , 1994, EUROCRYPT.
[34] Peter Honeyman,et al. Formal Methods for the Analysis of Authentication Protocols , 1993 .
[35] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.
[36] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[37] Li Gong,et al. Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[38] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[39] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[40] Walter Fumy,et al. Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..
[41] Catherine A. Meadows,et al. A logical language for specifying cryptographic protocol requirements , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[42] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[43] Thomas Y. C. Woo,et al. Authentication for distributed systems , 1997, Computer.
[44] Ross J. Anderson. UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.
[45] Jürgen Schönwälder,et al. A nonce-based protocol for multiple authentications , 1992, OPSR.
[46] J.A. Adam. Data security-cryptography=privacy? , 1992, IEEE Spectrum.
[47] Reihaneh Safavi-Naini,et al. Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[48] Virgil D. Gligor,et al. On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[49] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[50] E. Snekkenes. Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[51] Gene Tsudik,et al. Message authentication with one-way hash functions , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[52] Moti Yung,et al. Systematic Design of Two-Party Authentication Protocols , 1991, CRYPTO.
[53] Li Gong. Handling infeasible specifications of cryptographic protocols , 1991, Proceedings Computer Security Foundations Workshop IV.
[54] Einar Snekkenes. Exploring the BAN approach to protocol analysis , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[55] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[56] Colin Boyd,et al. Hidden assumptions in cryptographic protocols , 1990 .
[57] Li Gong. A note on redundancy in encrypted messages , 1990, CCRV.
[58] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[59] K. Okayama,et al. Design and implementation of an authentication system in WIDE Internet environment , 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings.
[60] Don Davis,et al. Network security via private-key certificates , 1990, OPSR.
[61] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[62] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[63] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[64] Martín Abadi,et al. Rejoinder to Nessett , 1990, OPSR.
[65] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[66] L. Gong,et al. Using one-way functions for authentication , 1989, CCRV.
[67] Martín Abadi,et al. The Scope of a Logic of Authentication , 1989, Distributed Computing And Cryptography.
[68] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[69] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[70] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[71] Gustavus J. Simmons,et al. How to insure that data acquired to verify treaty compliance are trustworthy , 1988, Proc. IEEE.
[72] D. K. Branstad,et al. Data Encryption Standard: past and future , 1988, Proc. IEEE.
[73] E. Brickell,et al. Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.
[74] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[75] Richard A. Kemmerer. Using Formal Verification Techniques to Analyze Encryption Protocols , 1987, 1987 IEEE Symposium on Security and Privacy.
[76] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[77] Roger M. Needham,et al. Authentication revisited , 1987, OPSR.
[78] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[79] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[80] Andrew Birrell. Secure communication using remote procedure calls , 1985, TOCS.
[81] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[82] Selim G. Aki. Digital signatures: A tutorial survey , 1983, Computer.
[83] Michael Willett. Cryptography old and new , 1982, Comput. Secur..
[84] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[85] Michael Willett,et al. A tutorial on public key cryptography , 1982, Comput. Secur..
[86] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[87] M. Hellman. The Mathematics of Public-Key Cryptography , 1979 .
[88] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[89] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[90] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.