Modelling a Public-Key Infrastructure
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. On Inter-Realm Authentication in Large Distributed Systems , 1993, J. Comput. Secur..
[2] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Ueli Maurer,et al. A Calculus for Secure Channel Establishment in Open Networks , 1994, ESORICS.
[6] S. Chokhani. Toward a national public key infrastructure , 1994, IEEE Communications Magazine.
[7] J.J. Tardo,et al. SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Nils J. Nilsson,et al. Probabilistic Logic * , 2022 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Reihaneh Safavi-Naini,et al. Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[13] Glenn H. MacEwen,et al. A logic for reasoning about security , 1992, TOCS.
[14] Virgil D. Gilgor,et al. On inter-realm authentication in large distributed systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Ronald Fagin,et al. Uncertainty, belief, and probability , 1989, IJCAI 1989.
[16] Anil Nerode,et al. Logic for Applications , 1997, Graduate Texts in Computer Science.
[17] Butler W. Lampson,et al. A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.
[18] Gene Tsudik,et al. KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.
[19] P. Venkat Rangan. An axiomatic theory of trust in secure communication protocols , 1992, Comput. Secur..
[20] Colin Boyd,et al. Security Architectures Using Formal Methods , 1993, IEEE J. Sel. Areas Commun..
[21] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[22] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.