Tailoring authentication protocols to match underlying mechanisms
暂无分享,去创建一个
[1] Dieter Gollmann,et al. Key distribution without individual trusted authentification servers , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[2] Thomas Beth,et al. Timely Authentication in Distributed Systems , 1992, ESORICS.
[3] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[4] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[5] Nancy A. Lynch,et al. An Overview of Clock Synchronization , 1986, Fault-Tolerant Distributed Computing.
[6] Stephen Pewsey,et al. Southend-on-Sea , 1995 .
[7] Thomas Beth,et al. Trust-based navigation in distributed systems , 1994 .
[8] Li Gong,et al. Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..
[9] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[10] K. Lam. Building an Authentication Service for Distributed Systems , 1993, J. Comput. Secur..
[11] Li Gong,et al. Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[12] Chris J. Mitchell,et al. Standardising Authentication Protocols Based on Public-Key Techniques , 1993, J. Comput. Secur..