On key distribution protocols for repeated authentication
暂无分享,去创建一个
[1] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Pierre Bieber,et al. A logic of communication in hostile environment , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[6] Einar Snekkenes. Exploring the BAN approach to protocol analysis , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Ulf Carlsen. Using Logics to Detect Implementation-Dependent Flaws , 1993 .
[8] Li Gong,et al. Logics for cryptographic protocols-virtues and limitations , 1991, Proceedings Computer Security Foundations Workshop IV.
[9] Ulf Carlsen. Using logics to detect implementation-dependent flaws [cryptographic protocol design] , 1993, Proceedings of 9th Annual Computer Security Applications Conference.
[10] Raphael Yahalom. Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols , 1993, J. Comput. Secur..
[11] Catherine A. Meadows,et al. A logical language for specifying cryptographic protocol requirements , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Jürgen Schönwälder,et al. A nonce-based protocol for multiple authentications , 1992, OPSR.
[13] E. Snekkenes. Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[15] Paul F. Syverson. Adding time to a logic of authentication , 1993, CCS '93.
[16] D SchroederMichael,et al. Using encryption for authentication in large networks of computers , 1978 .
[17] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[18] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[19] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Paul F. Syverson,et al. Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols , 1992, J. Comput. Secur..
[21] Moti Yung,et al. Systematic Design of Two-Party Authentication Protocols , 1991, CRYPTO.
[22] Martín Abadi,et al. Rejoinder to Nessett , 1990, OPSR.
[23] Pierre Bieber. Aspects epistemiques des protocoles cryptographiques , 1989 .
[24] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.