A lesson on authentication protocol design
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[2] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[3] Paul F. Syverson. On key distribution protocols for repeated authentication , 1993, OPSR.
[4] Thomas Y. C. Woo,et al. Authentication for distributed systems , 1997, Computer.
[5] Simon S. Lam,et al. Verifying authentication protocols: methodology and example , 1993, 1993 International Conference on Network Protocols.
[6] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[7] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[8] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] E. Snekkenes. Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] T.Y.C. Woo,et al. 'Authentication' revisited (correction and addendum to 'Authentication' for distributed systems, Jan. 92, 39-52) , 1992 .
[11] N. S. Barnett,et al. Private communication , 1969 .