Bauer-Berson-Feiertag attack revisited
暂无分享,去创建一个
[1] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Victor Shoup,et al. Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.
[4] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[5] Thomas A. Berson,et al. A key distribution protocol using event markers , 1983, TOCS.
[6] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[7] Li Gong,et al. A security risk of depending on synchronized clocks , 1992, OPSR.
[8] Peter Honeyman,et al. Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol , 1998, CARDIS.
[9] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[10] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Giampaolo Bella. Modelling Security Protocols based on Smart Cards , 1999 .